US20110004746A1 - Unit using os and image forming apparatus using the same - Google Patents
Unit using os and image forming apparatus using the same Download PDFInfo
- Publication number
- US20110004746A1 US20110004746A1 US12/889,694 US88969410A US2011004746A1 US 20110004746 A1 US20110004746 A1 US 20110004746A1 US 88969410 A US88969410 A US 88969410A US 2011004746 A1 US2011004746 A1 US 2011004746A1
- Authority
- US
- United States
- Prior art keywords
- unit
- image forming
- cpu
- forming apparatus
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000015654 memory Effects 0.000 claims abstract description 101
- 238000004891 communication Methods 0.000 claims abstract description 78
- 238000012545 processing Methods 0.000 claims abstract description 15
- 238000012544 monitoring process Methods 0.000 claims abstract description 8
- 238000003860 storage Methods 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 11
- 238000011084 recovery Methods 0.000 claims description 8
- 238000000034 method Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 11
- 239000004065 semiconductor Substances 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000003384 imaging method Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 235000001892 vitamin D2 Nutrition 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00002—Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
- H04N1/00007—Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for relating to particular apparatus or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G15/00—Apparatus for electrographic processes using a charge pattern
- G03G15/06—Apparatus for electrographic processes using a charge pattern for developing
- G03G15/08—Apparatus for electrographic processes using a charge pattern for developing using a solid developer, e.g. powder developer
- G03G15/0822—Arrangements for preparing, mixing, supplying or dispensing developer
- G03G15/0863—Arrangements for preparing, mixing, supplying or dispensing developer provided with identifying means or means for storing process- or use parameters, e.g. an electronic memory
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G15/00—Apparatus for electrographic processes using a charge pattern
- G03G15/50—Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
- G03G15/5066—Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control by using information from an external support, e.g. magnetic card
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G15/00—Apparatus for electrographic processes using a charge pattern
- G03G15/50—Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
- G03G15/5075—Remote control machines, e.g. by a host
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G15/00—Apparatus for electrographic processes using a charge pattern
- G03G15/55—Self-diagnostics; Malfunction or lifetime display
- G03G15/553—Monitoring or warning means for exhaustion or lifetime end of consumables, e.g. indication of insufficient copy sheet quantity for a job
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G21/00—Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
- G03G21/16—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
- G03G21/18—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
- G03G21/1875—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
- G03G21/1878—Electronically readable memory
- G03G21/1889—Electronically readable memory for auto-setting of process parameters, lifetime, usage
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G21/00—Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
- G03G21/16—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
- G03G21/18—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
- G03G21/1875—Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
- G03G21/1878—Electronically readable memory
- G03G21/1892—Electronically readable memory for presence detection, authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K15/00—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
- H04N1/4426—Restricting access, e.g. according to user identity involving separate means, e.g. a server, a magnetic card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
- H04N1/4433—Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G2215/00—Apparatus for electrophotographic processes
- G03G2215/00025—Machine control, e.g. regulating different parts of the machine
- G03G2215/00109—Remote control of apparatus, e.g. by a host
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G2215/00—Apparatus for electrophotographic processes
- G03G2215/06—Developing structures, details
- G03G2215/066—Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material
- G03G2215/0695—Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material using identification means or means for storing process or use parameters
- G03G2215/0697—Toner cartridge or other attachable and detachable container for supplying developer material to replace the used material using identification means or means for storing process or use parameters being an electronically readable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present general inventive concept relates to a unit including a built-in central processing unit (CPU) and an image forming apparatus using the same. More particularly, the present general inventive concept relates to a unit which becomes more secure by having a CPU with an operating system (OS), and an image forming apparatus using the same.
- OS operating system
- peripherals As computers have become widely used, peripherals have also become widespread. Examples of peripherals are image forming apparatuses such as printers, scanners, copiers, and multifunction devices.
- Image forming apparatuses use ink or toner to print images onto paper. Ink and toner are used whenever image forming operations are performed, until the ink toner is finally exhausted. If ink or toner is empty, a user must replace a unit for storing the ink or toner. Such components which are replaceable while using the image forming apparatuses are referred to as consumables or replaceable units.
- replaceable units some units other than units which have to be replaced when the ink or toner is exhausted must be replaced after being used for a predetermined period of time. This is so even if ink or toner are not exhausted since properties of the units change after the predetermined period of time and the printing quality is thus reduced.
- a laser image forming apparatus includes a charge unit, a transfer unit, a fusing unit, and so on, and diverse kinds of rollers and belts used in each unit may be worn out or damaged due to use over a limited life span. As a result, the printing quality may be remarkably deteriorated. Therefore, the user has to replace such replaceable units at appropriate times.
- the time to replace replaceable units can be determined using a use state index.
- the use state index represents an index to indicate the degrees of use of the image forming apparatus, for example, the number of pieces of paper printed by the image forming apparatus and the number of dots forming an image.
- the image forming apparatus can determine the time to replace replaceable units by measuring the number of pieces of paper printed by the image forming apparatus or the number of dots.
- each replaceable unit has included a built-in customer replaceable unit monitoring memory (CRUM memory).
- CRUM memory customer replaceable unit monitoring memory
- the use state index of each replaceable unit is stored in the CRUM memory. Accordingly, even if each replaceable unit is separated and used in different image forming apparatuses, the use state of each replaceable unit can be determined precisely.
- a conventional replaceable unit having a CRUM memory has a problem that users can easily access the CRUM memory.
- Information stored in the CRUM memory is very diverse, spanning from basic information regarding the manufacturer to information regarding the recent use state. If the information is modified, it is difficult to receive after-sale service and calculate the adequate time to replace the replaceable unit, resulting in degradation of image forming operations. In particular, if information regarding the manufacturer is modified, it is impossible to determine whether it is authentic and thus is difficult to manage the replaceable unit.
- the present general inventive concept provides a unit which becomes more secure by having a built-in CPU with an operating system (OS), and an image forming apparatus using the same.
- OS operating system
- An embodiment of the present general inventive concept may be achieved by providing a chip which is mountable on a replaceable unit used in an image forming apparatus, the chip including a central processing unit (CPU) with an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, to perform authentication communication with the main body of the image forming apparatus using the OS of the CPU.
- CPU central processing unit
- OS operating system
- the CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- the initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- the CPU may perform cryptographic data communication when the authentication is completed.
- the CPU may generate message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the CPU may perform the initialization according to the OS of the CPU, and does not respond to a command from the main body of the image forming apparatus before the initialization is completed, and perform the authentication when the initialization is completed.
- the chip may further include a memory unit to store information regarding at least one of the chips, a replaceable unit, a customer replaceable unit monitoring memory (CRUM) unit mounted on the replaceable unit in which the chip is able to be mounted, and the OS of the CPU.
- a memory unit to store information regarding at least one of the chips
- a replaceable unit to store information regarding at least one of the chips
- CRUM customer replaceable unit monitoring memory
- the OS of the CPU may drive at least one of the chip, the CRUM unit, and the replaceable unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize one state of the chip, the CRUM unit, and the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- the chip may further include a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication on the main body of the image forming apparatus by applying a preset cryptographic algorithm among a plurality of cryptographic algorithms.
- the cryptographic algorithm applied to the authentication may be changeable.
- the CPU may receive values of usage degrees of each of consumables used for the image forming job from the main body of the image forming apparatus when the image forming job is executed using the replaceable unit, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing a CRUM unit which can be used for an image forming apparatus, the CRUM unit including a memory unit to store information regarding a unit on which the CRUM unit is mounted, and a CPU to manage the memory unit using the operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus.
- OS operating system
- the CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- the initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- the OS of the CPU may drive the CRUM unit or a replaceable unit including the CRUM unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize the state of the CRUM unit or the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- the CPU may perform the authentication, and performs cryptographic data communication when the authentication is completed.
- the CPU may generate a message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the OS of the CPU may perform the initialization, and does not respond to a command from the main body of the image forming apparatus before the initialization is completed.
- the CRUM unit may further include an interface unit to connect the image forming apparatus to the CPU, a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication on the image forming apparatus by applying the preset cryptographic algorithm among a plurality of cryptographic algorithms.
- the cryptographic algorithm applied to the authentication may be changeable.
- the CPU may receive values of usage degrees of each of consumables used for the image forming job when the image forming job is executed, from the main body of the image forming apparatus, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing a replaceable unit which is also mountable on an image forming apparatus, the replaceable unit including a memory unit to store information on the replaceable unit, and a CPU to manage the memory unit using an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication on the main body of an image forming apparatus.
- OS operating system
- the CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- the initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- the OS of the CPU may drive the replaceable unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize the state of the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- the CPU may perform the cryptographic data communication when the authentication between the main body of the image forming apparatus and the replaceable unit is completed.
- the CPU may generate a message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- MAC message authentication code
- the CPU may perform the initialization according to its own OS, and may not respond to a command from the main body of the image forming apparatus before the initialization is completed.
- the replaceable unit may further include an interface unit to connect the image forming apparatus to the CPU, a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication or the cryptographic data communication with the image forming apparatus by applying the set cryptographic algorithm among a plurality of cryptographic algorithms.
- the cryptographic algorithm applied to the authentication may be changeable.
- the CPU may receive values of usage degrees of each of consumables used for the image forming job when the image forming job is executed, from the main body of the image forming apparatus, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing an image forming apparatus including a main controller, and at least one unit which includes a memory unit to store information and a CPU to manage the memory unit using the operating system (OS) of the CPU, operating separately from an OS of the main controller, and to perform at least one of authentication and cryptographic data communication with the main controller.
- OS operating system
- the CPU may perform initialization using the OS of the CPU, operating separately from the main controller.
- the initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- the at least one unit may perform the authentication on the main controller using a preset cryptographic algorithm, the cryptographic algorithm being changeable.
- the main controller may request authentication to the CPU of the at least one unit, and when digital signature information and a MAC are transmitted from the CPU, the main controller may detect the digital signature information and the MAC to perform the authentication.
- the main controller may generate a first random value and then transmit the first random value and an authentication request to the CPU of the at least one unit, detect digital signature information when the digital signature information is received, receive a first MAC and a second random value from the CPU in response to the authentication request, independently generate a session key and a second MAC using the first and second random values, and compare and detect the generated second MAC and the received first MAC.
- the main controller may receive the unique digital signature information set for each unit of the at least one unit and perform the authentication, and perform the cryptographic data communication with the respective CPUs of each unit when the authentication has succeeded.
- the main controller may perform the authentication by applying a RSA asymmetric key algorithm and one of ARIA, triple data encryption standards (TDES), SEED and advanced encryption standards (AES) symmetric key algorithms, and the CPU of the unit may perform the authentication by applying one of the ARIA, TDES, SEED, AES symmetric key algorithms.
- the unit may further include a crypto unit to allow the CPU to perform the authentication or the cryptographic data communication with the main controller of the image forming apparatus by applying the set cryptographic algorithm among a plurality of cryptographic algorithms and a tamper detector to respond to physical hacking attempts.
- a crypto unit to allow the CPU to perform the authentication or the cryptographic data communication with the main controller of the image forming apparatus by applying the set cryptographic algorithm among a plurality of cryptographic algorithms and a tamper detector to respond to physical hacking attempts.
- the main controller may be connected to the at least one unit through one serial I/O channel, and be accessed to the at least one unit using individual addresses given to each unit.
- the main controller may measure values of usage degrees of each of consumables used for the job, transmit the measured values to each CPU of the at least one unit, add the values to the information on the usage degrees of each of consumables pre-stored in each CPU, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- the OS of the CPU may drive the unit, and the OS of the CPU may be software that executes at least one of an initialization operation, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- the unit may be one of a replaceable unit directly associated with an image forming job of the image forming apparatus, a CRUM unit mountable on the replaceable unit, and a chip mountable on the CRUM unit.
- An embodiment of the present general inventive concept may also be achieved by providing a computer readable medium to contain computer-readable codes as a program to perform a method, the method including performing authentication communication with a main body of an image forming apparatus using an operating system (OS) of a central processing unit (CPU), which operates separately from an OS of the image forming apparatus.
- OS operating system
- CPU central processing unit
- An embodiment of the present general inventive concept may also be achieved by providing a semiconductor chip package which is mountable on a replaceable unit in an image forming apparatus having an operating system, the semiconductor chip including a memory to store data, and a central processing unit (CPU) to process the data such that the processed data is transmitted to the operating system (OS) of the image forming apparatus.
- the semiconductor chip including a memory to store data, and a central processing unit (CPU) to process the data such that the processed data is transmitted to the operating system (OS) of the image forming apparatus.
- OS operating system
- the memory and the processor are disposed in a single integrated body.
- An embodiment of the present general inventive concept may also be achieved by providing a computer readable medium containing computer-readable codes as a program to perform authentication communication with a main body of an image forming apparatus using an operating system (OS) of a central processing unit (CPU), which operates separately from an OS of the image forming apparatus.
- OS operating system
- CPU central processing unit
- An embodiment of the present general inventive concept may also be achieved by providing a replaceable unit which is mountable on an image forming apparatus to be used in an image forming job, the replaceable unit including a memory unit to store information on the replaceable unit, and a CPU to manage the memory unit using an operating system (OS) of the CPU which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus, wherein random values are used upon transmitting information or commands for authentication between the CPU and the main body of the image forming apparatus.
- OS operating system
- An embodiment of the present general inventive concept may also be achieved by providing an image forming apparatus, including a main controller, and at least one unit which includes a memory unit to store information and a CPU to manage the memory unit using an operating system (OS) of the CPU that operates separately from an OS of the main controller, and to perform authentication communication with the main controller, wherein random values are used upon transmitting information or commands for authentication, between the CPU and the OS of the main controller of the image forming apparatus.
- OS operating system
- An embodiment of the present general inventive concept may also be achieved by providing a chip which is mountable on a replaceable unit used in an image forming apparatus, the chip including a central processing unit (CPU) with an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, to perform authentication communication with a main body of an image forming apparatus, using the OS of the CPU, and a memory unit to store information regarding at least one of the chip, a customer replaceable unit monitoring (CRUM) unit, a replaceable unit with the CRUM unit, and the OS of the CPU, wherein the OS of the CPU is provided in the memory unit within the chip or in memory external to the chip.
- a central processing unit CPU
- OS operating system
- CRUM customer replaceable unit monitoring
- An embodiment of the present general inventive concept may also be achieved by providing a customer replaceable unit monitoring (CRUM) unit which can be used in an image forming apparatus, the CRUM unit including a memory unit to store information regarding a unit on which the CRUM unit is mounted, and a CPU to manage the memory unit using an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus, wherein the OS of the CPU comprises a memory recovery region configured to determine whether an update is successfully achieved according to a process of updating the condition information of the CRUM unit.
- OS operating system
- a CPU with its own operation system is mounted in the unit, so the unit can manage the memory unit independently.
- the unit may be a chip, a CRUM unit, or replaceable unit.
- the OS is driven so that initialization, cryptographic algorithm driving, and authentication with the main body of the image forming apparatus may be performed.
- the image forming apparatus may perform authentication or cryptographic data communication with the unit. Therefore, a master key can be prevented from being leaked.
- the authentication or cryptographic data communication may be performed using a MAC generated based on a random value, and electronic signature information.
- the authentication is performed by applying both symmetric and asymmetric key algorithms, so the cryptography provides high level data security.
- a plurality of cryptographic algorithms may be selectively applied to the authentication and the cryptographic data communications. Even if the currently used cryptographic algorithm is attacked by physical hacking, the attack may be prevented by replacing the currently used key with a key applying the other cryptographic algorithm without replacing the unit with a new unit.
- a plurality of units are used, electronic signature information is set for each unit. Individual addresses are given to each unit, and thus the unit may be connected to the image forming apparatus through a serial interface. Authentication and cryptographic data communication between the plurality of units is efficiently achieved.
- the image forming apparatus measures the usage degrees of each of consumables used for the image forming job, and transmits the measured values to each of the plurality of units. Therefore, incorrect information regarding the usage degrees of each of the consumables used is prevented from being recorded due to errors.
- FIG. 1 is a schematic block diagram illustrating a configuration of an image forming apparatus including a replaceable unit according to an exemplary embodiment of the present general inventive concept
- FIG. 2 is a detailed block diagram illustrating a configuration of the replaceable unit according to an exemplary embodiment of the present general inventive concept
- FIG. 3 is a schematic block diagram illustrating a configuration of an image forming apparatus according to an exemplary embodiment of the present general inventive concept
- FIG. 4 is a schematic block diagram illustrating a configuration of software which is built into the image forming apparatus and the replaceable unit according to an exemplary embodiment of the present general inventive concept
- FIG. 5 is a flowchart illustrating a method of operating the replaceable unit and the image forming apparatus according to an exemplary embodiment of the present general inventive concept
- FIG. 6 is a flowchart illustrating a process of changing cryptographic algorithms by the replaceable unit according to an exemplary embodiment of the present general inventive concept.
- FIG. 7 is a flowchart illustrating a method of performing authentication and cryptographic data communications between the image forming apparatus and the replaceable unit according to an exemplary embodiment of the present general inventive concept.
- FIG. 1 is a schematic block diagram illustrating a configuration of an image forming apparatus including a replaceable unit according to an exemplary embodiment of the present general inventive concept.
- the image forming apparatus 100 includes a main controller 110 , and a unit 200 may be built into the image forming apparatus 100 .
- the image forming apparatus 100 may be a copier, a printer, a multifunction peripheral, a facsimile machine, or a scanner.
- the image forming apparatus 100 may include an (OS) 115 to control operations of the image forming apparatus 100 .
- the unit 200 represents a component which is designed to be installed and used independently. More specifically, the unit 200 may be a replaceable unit including at least one replaceable element 215 which is formed in the image forming apparatus and directly intervenes in the image forming operation.
- the at least one replaceable element 215 of the replaceable unit 200 may be a toner or ink cartridge, a charge unit, a transfer unit, a fusing unit, an organic photo conductor (OPC), a feeding unit, or a feeding roller, etc.
- OPC organic photo conductor
- the unit 200 may be any other component which is necessary for the image forming apparatus 100 , and is replaceable during use. That is, the unit 200 may be a customer replaceable unit monitor (CRUM) which can monitor and manage the state of a component by being included in the replaceable unit, or may be a chip built into the CRUM.
- CRUM customer replaceable unit monitor
- the unit 200 can be implemented in diverse forms, but a unit 200 implemented as a replaceable unit is described hereinbelow for convenience of description.
- the main controller 110 may have an interface to communicate with an external device (not illustrated) to receive data and may perform an image forming operation using the received data.
- the main controller 110 may also be connected to a facsimile unit or a scanning unit, for example, to receive or transmit data corresponding to the image forming operation.
- the image forming apparatus 100 may include an image forming unit 150 to perform the image forming operation using the unit 200 .
- the unit 200 can be part of the image forming unit 150 when being installed in a body of the image forming apparatus 100 .
- the main controller 110 can control the memory unit 210 and the image forming unit 150 to feed a medium into the image forming apparatus to form an image on the medium, and to discharge the medium.
- the unit 200 includes a memory unit 210 and a central processing unit (CPU) 220 .
- CPU central processing unit
- the memory unit 210 stores diverse types of information regarding the unit 200 , and, more specifically, stores unique information such as information regarding the manufacturer of the unit 200 , information regarding the time of manufacture, a serial number or a model number, diverse programs, information regarding an electronic signature, state information regarding the state of use (for example, how many pieces of paper have been printed up until the present time, what the remaining printable capacity is, or how much toner is left).
- unique information such as information regarding the manufacturer of the unit 200 , information regarding the time of manufacture, a serial number or a model number, diverse programs, information regarding an electronic signature, state information regarding the state of use (for example, how many pieces of paper have been printed up until the present time, what the remaining printable capacity is, or how much toner is left).
- the memory unit 210 may store information as in the following Table 1.
- the memory unit 210 may store diverse information regarding life span of consumables, and setup menus, as well as schematic information regarding the unit 200 .
- the memory unit 210 may also store information of an operating system (OS) to process data stored therein such that the main controller 110 can control the image forming unit 150 and the unit 200 to perform the image forming operation.
- OS operating system
- the CPU 220 manages the memory unit 210 using an operating system (OS) of the CPU 220 .
- the OS which is provided to operate the unit 200 , represents software to operate general application programs. Accordingly, the CPU 220 can perform self-initialization using the OS.
- the CPU 220 performs initialization at the time of particular events, for example, when the image forming apparatus 100 including the unit 200 is turned on, or when the unit 200 or a component including the unit 200 , such as a replaceable unit is attached to or detached from the image forming apparatus 100 .
- Initialization includes initial driving of diverse application programs used in the unit 200 , calculation of secret information needed for data communications with the image forming apparatus after initialization, setup of a communication channel, initialization of a memory value, confirmation of a replacement time, setting of register values in the unit 200 , and setting of internal and external clock signals.
- Setting of register values represents setting function register values in the unit 200 in order for the unit 200 to operate in the same state as the user previously set.
- setting of internal and external clock signals represents adjusting a frequency of an external clock signal provided from the main controller 110 of the image forming apparatus 100 to a frequency of an internal clock signal to be used in the CPU 220 of the unit 200 .
- Confirmation of the replacement time represents checking the remaining amount of toner or ink in use, anticipating time when the toner or ink will be exhausted, and notifying the main controller 110 of the time. If it is determined during initialization that the toner has already been exhausted, after completing initialization the unit 200 may be implemented to automatically notify the main controller 110 that operation cannot be performed. In other cases, since the unit 200 includes an OS of the CPU 220 , diverse forms of initialization can be performed according to the type or characteristic of the unit 200 .
- Such initialization is performed by the unit 200 itself, and thus is performed separately from initialization performed by the main controller 110 of the image forming apparatus 100 .
- the CPU 220 is built in the unit 200 and the unit 200 has its own OS, so if the image forming apparatus 100 is turned on, the main controller 110 can check the remaining amount of consumables and the number of refills, which are stored in the memory unit 210 , before requesting communication with the unit 200 . Consequently, it takes a shorter time to inform the main controller 110 that consumables should be replaced. For example, if toner is insufficient, the user can turn on the image forming apparatus 100 , and convert the image forming apparatus 100 directly into a toner saving mode. The user can also perform the same operation even when only one particular toner is insufficient.
- the CPU 220 does not respond to commands of the main controller 110 until initialization is completed.
- the main controller 110 periodically transmits commands to the CPU 220 until the main controller 110 receives a response from the CPU 220 .
- main controller 110 receives a response, that is, an acknowledgement, authentication is initiated between the main controller 110 and the CPU 220 .
- the OS in the unit 200 enables authentication by interaction between the unit 200 and the image forming apparatus 100 .
- the main controller of the image forming apparatus unilaterally accesses the unit, identifies unique information for authentication, and compares the unique information with stored information.
- the main controller 110 in the image forming apparatus 100 performs its own initialization separately from initialization of the unit 200 .
- Initialization of the unit 200 is completed first due to differences in the size of the systems. If initialization of the unit 200 is completed, the unit 200 can drive a cryptographic algorithm using the OS. More specifically, the unit 200 may drive a cryptographic algorithm in response to a command of the main controller 110 so that interactive authentication between the main controller 110 and the unit 200 , not unilateral authentication of the main controller 110 , can be performed. Consequently, security of authentication increases.
- the main controller 110 may receive a response from the CPU 220 and transmit a command to the CPU 220 requesting authentication.
- a random value R 1 can be transmitted to the CPU 220 of the replaceable unit 200 along with the command.
- the CPU 220 receives the request for authentication and the random value R 1 , generates a session key using the random value R 1 , generates a first message authentication code (MAC) using the generated session key, and transmits the generated first MAC, pre-stored electronic signature information, and a random value R 2 to the main controller 110 .
- MAC message authentication code
- the main controller 110 identifies the authenticity by verifying the first MAC, the received electronic signature information, the main controller 110 generates a session key using the received random value R 2 and the pre-generated random value R 1 and generates a second MAC using the session key. Finally, the main controller 110 verifies the second MAC by identifying whether or not the generated second MAC is the same as the received first MAC. As a result, the main controller 110 can determine if authentication has been successfully performed. As described above, since random values are used upon transmitting information or commands for authentication, malicious hacking by a third party can be prevented.
- cryptographic data communications is performed between the main controller 110 and the CPU of the unit 200 .
- a cryptographic algorithm can be executed. Therefore, data validity can be determined by applying the cryptographic algorithm to the data received from the image forming apparatus 100 . As a result of this determination, if the data is valid, the unit 200 receives the data and performs an operation to process the data. If the data are not valid, the unit 200 may discard the data as soon as receiving the data. In this case, the unit 200 may notify the main controller 110 that there exists a problem in data communications.
- the cryptographic algorithm may use a public standard cryptographic algorithm. Such a cryptographic algorithm can be modified when an encryption key is opened or when security needs to be reinforced.
- the unit 200 since the unit 200 has its own OS, and its own initialization, authentication and cryptographic data communications between the unit 200 and the image forming apparatus 100 can be performed efficiently.
- FIG. 2 is a detailed block diagram illustrating the replaceable unit 200 of the image forming apparatus 100 illustrated in FIG. 1 .
- the replaceable unit 200 of FIG. 2 includes a crypto unit 230 , a tamper detector 240 and an interface unit 250 in addition to the previously discussed memory unit 210 and CPU 220 . Additionally, the replaceable unit 200 may further include a clock unit (not illustrated) to output a clock signal or a random value generator (not illustrated) to generate random values for authentication.
- the replaceable unit 200 discussed herein may include less components or more components, depending on the application. Further, if the replaceable unit 200 is implemented as a semiconductor chip or semiconductor chip package, the chip or chip package may include either the CPU 220 by itself, or may include both the memory unit 210 and CPU 220 . If the chip includes only the CPU 220 , an OS executed by the CPU 220 may be provided by an external memory.
- the crypto unit 230 supports a cryptographic algorithm and causes the CPU 220 to perform authentication or cryptographic data communication with the main controller 110 .
- the crypto unit 230 may support one of four cryptographic algorithms, including ARIA, triple data encryption standard (TDES), SEED, and advanced encryption standard (AES) symmetric key algorithms.
- the main controller 110 To perform authentication or cryptographic data communication, the main controller 110 also supports the four cryptographic algorithms. Accordingly, the main controller 110 may determine which cryptographic algorithm is applied by the replaceable unit 200 , may perform the authentication using the determined cryptographic algorithm, and may then perform the cryptographic data communication with the CPU 220 . As a result, the replaceable unit 200 may be easily mounted in the image forming apparatus 100 so that the cryptographic data communication may be performed, even when a key to which a certain cryptographic algorithm is applied is generated.
- the tamper detector 240 prevents various physical hacking attacks, namely tampering.
- an attack is detected by monitoring operating conditions such as the voltage, temperature, pressure, light or frequency, the tamper detector 240 may delete data relating to the attack, or may physically prevent the attack. In this situation, the tamper detector 240 may include an extra power source to supply power to maintain the operation thereof.
- the attack may be a decap attack which can be a potentially damaging attack to the CRUM unit 200 , for example.
- the replaceable unit 200 includes the crypto unit 230 and tamper detector 240 , so it is possible to systematically secure data using either or both hardware and software.
- the memory unit 210 may include at least one of an OS memory 211 , a non-volatile memory 212 and a volatile memory 213 .
- the OS memory 211 stores an OS to operate the replaceable unit 200 .
- the non-volatile memory 212 stores data in non-volatile form and the volatile memory 213 is used as a temporary storage space required for operations.
- the memory unit 210 includes the OS memory 211 , non-volatile memory 212 and volatile memory 213 as illustrated in FIG. 2 , some of these memories may be built into the CPU 220 as internal memories.
- the OS memory 211 , non-volatile memory 212 and volatile memory 213 may be implemented according to a design for security such as address/data line scrambling or bit encryption, differently from general memories.
- the non-volatile memory 212 may store a variety of information, such as digital signature information, information regarding various cryptographic algorithms, information regarding the state of use of the replaceable unit 200 (for example, information regarding the remaining toner level, the time at which toner needs to be replaced, or the number of remaining sheets to be printed), unique information (for example, information regarding the manufacturer of the replaceable unit 200 , information regarding the date and time of manufacture, serial number or model number), or repair service information.
- digital signature information information regarding various cryptographic algorithms
- information regarding the state of use of the replaceable unit 200 for example, information regarding the remaining toner level, the time at which toner needs to be replaced, or the number of remaining sheets to be printed
- unique information for example, information regarding the manufacturer of the replaceable unit 200 , information regarding the date and time of manufacture, serial number or model number
- repair service information for example, information regarding the manufacturer of the replaceable unit 200 , information regarding the date and time of manufacture, serial number or model number.
- the interface unit 250 connects the CPU 220 and the main controller 110 .
- the interface unit 250 may be implemented as a serial interface or wireless interface.
- a serial interface has an advantage of cost reduction due to the use of fewer signals than a parallel interface, and the serial interface is suitable for an operating condition where a large amount of noise occurs, such as a printer.
- FIG. 2 The components illustrated in the FIG. 2 are connected to each other via a bus, but this is merely an example. Accordingly, it is to be understood that the components according to aspects of the present general inventive concept may be connected directly without the bus.
- FIG. 3 is a block diagram illustrating the image forming apparatus 100 according to an exemplary embodiment of the present general inventive concept.
- the image forming apparatus 100 of FIG. 3 may include an OS 115 , a main controller 110 , a storage unit 120 , an image forming unit 150 , and a plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n of FIG. 3 may be CRUM units, semiconductor chips, semiconductor chip packages, or replaceable units.
- the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n are hereinafter described as replaceable units.
- a single system requires various consumables
- a plurality of units are also required.
- the image forming apparatus 100 is a color printer
- four color cartridges namely cyan (C), magenta (M), yellow (Y) and black (K) cartridges
- C cyan
- M magenta
- Y yellow
- K black
- the color printer may include other consumables.
- each of the units requires its own input/output (I/O) channel, so the arrangement can be inefficient. Therefore, as illustrated in FIG. 3 , a single serial I/O channel may be used to connect each of the plurality of units 200 - 1 , 200 - 2 , . . .
- the main controller 110 may access each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n using different addresses assigned to each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n.
- the main controller 110 When the main controller 110 is turned on or when the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n are mounted in the image forming apparatus 100 , if each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n is completely initialized, authentication is performed using unique digital signature information for each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n.
- the main controller 110 performs cryptographic data communication with a plurality of CPUs (not illustrated) in the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n , and stores information regarding the use history in a plurality of memory units (not illustrated) in the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the main controller 110 and plurality of CPUs may act as master and slave.
- the cryptographic data communication is performed by transmitting data, which a user desires to transmit, together with a MAC generated by encrypting the data using a preset cryptographic algorithm and key. Since the data varies every time it is transmitted, the MAC may also change. Accordingly, even when a third party intervenes in the data communication operation and finds a MAC, it is impossible for the third party to hack subsequent data communication operations using the MAC. Therefore, the security of data communication can be increased.
- the channel connected between the main controller 110 and CPUs may be cut.
- the storage unit 120 stores a variety of information including key values and a plurality of cryptographic algorithms required for authentication of each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n.
- the main controller 110 performs authentication and cryptographic data communication using the information stored in the storage unit 120 . Specifically, the main controller 110 performs the authentication and the cryptographic data communication by applying an RSA asymmetric key algorithm and one of the ARIA, TDES, SEED, AES symmetric key algorithms, for example. Therefore, both asymmetric and symmetric authentication processes are performed, so it is possible to increase the cryptographic level, relative to the conventional art.
- the storage unit 120 may include a storage unit to store a variety of cryptographic algorithm data, a storage unit required for other operations of the main controller 110 , a storage unit to store information regarding the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n , or a storage unit to store information regarding the use of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n (for example, sheets to be printed or remaining toner level).
- the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n mounted in the image forming apparatus 100 of FIG. 3 may have the configurations illustrated in FIG. 1 or FIG. 2 . Accordingly, after sending access commands to the plurality of CPUs of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n and receiving acknowledge signals, the main controller 110 may access the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n . Therefore, the plurality of units according to an exemplary embodiment of the present general inventive concept differ from a conventional scheme capable of accessing CRUM data that uses simple data writing and reading operations.
- the main controller 110 may measure values of usage degrees of each of consumables used for the job, and may transmit the measured degrees to each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the image forming apparatus 100 may add the measured degrees of consumables used to previously stored information on the use of consumables, may transmit a result value to the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n , and may refresh the information on the use of consumables.
- the main controller 110 may measure usage degrees of each of consumables used for the job, and may transmit only the measured degrees of consumables used to each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the main controller 110 may transmit a value of 10 sheets, so the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n may, through the use of their own CPUs, add the newly received value of ‘10 ’ to a value of ‘1000 ’, namely a previously stored value. Accordingly, the information on the use of consumables stored in the memory may be correctly updated to be ‘1010’.
- the main controller 110 may manage the information on the usage degrees of each of consumables used by itself by adding the measured amounts to the information on the use of consumables stored in the storage unit 120 , separately from the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n.
- the main controller 110 may automatically update the information on the usage degrees of each of consumables stored in the storage unit 120 while transmitting the information on the usage degrees of each of consumables used to the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n every time the job is executed.
- the main controller 110 may send a value of ‘ 10 ’ to the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n , and may add the value of ‘10 ’ to a value of ‘100 ’ previously stored in the storage unit 120 , so as to store history information indicating that ‘110 ’ sheets were printed.
- the main controller 110 and plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n may compare their respective history information, through the use of their own CPUs, so it is possible to check whether data is normally recorded in each of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n.
- accuracy or inaccuracy of the information on the use of consumables stored may be determined by comparing the information on the use of consumables stored in the storage unit 120 to the information on the use of consumables stored in the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the main controller 110 may transmit a command to request the information on the use of consumables to the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n .
- the CPUs of the plurality of units 200 - 1 , 200 - 2 , . . . , 200 - n may transmit the information on the use of consumables stored therein to the main controller 110 .
- the main controller 110 may output an error message, or may harmonize information determined to be correct and may update the information on the use of consumables.
- the main control 110 may transmit a command to change the information on the use of consumables stored in the storage unit 120 , because there is a possibility that errors could occur when data is transmitted to the storage unit 120 .
- the image forming apparatus 100 may also include an image forming unit 150 to perform the image forming operation using the units 200 - 1 , 200 - 2 . . . 200 - n .
- the units 200 - 1 , 200 - 2 . . . 200 - n can be part of the image forming unit 150 when being installed in a body of the image forming apparatus 100 .
- the main controller 110 can control the memory units 120 and 210 and the image forming unit 150 to feed a medium into the image forming apparatus to form an image on the medium and to discharge the medium.
- FIG. 4 is a hierarchy diagram illustrating a unit 200 and a host using the unit 200 , that is, a configuration of software of an image forming apparatus according to an exemplary embodiment of the present general inventive concept.
- software (a) of the image forming apparatus 100 may include a security mechanism region to perform authentication and cryptography with the unit 200 , and a software cryptographic operation region to perform software cryptography, in addition to general application programs, an application for managing data of each unit, a device driver which performs its own management, and a program for processing commands.
- Software (b) of the unit 200 may include a semiconductor IC chip region having various blocks to secure data, an App region to interface with host software, and an OS region to operate the regions.
- the Device Software region of FIG. 4 may include basic elements of an OS such as file management and data integrity programs.
- the OS region may further include operating blocks required to secure data including a security mechanism, software cryptographic operations and security countermeasure operations.
- the OS may include programs to control hardware for a security system including hardware memory management and hardware cryptographic management. As illustrated, the OS may include using a hardware input/output management function, as well as standard protocol, command processing, and application execution programs.
- the Applications (App) region of the Device Software region includes an application for managing replaceable units and a general security application.
- the semiconductor IC chip region may house the CPU, physical memory and input/output terminals and may further include a program to prevent tampering with other programs, a random number generation program, operating condition controls, a cryptographic process program, as well as a probability security mechanism. Since an application program to implement a function of CRUM is installed on the programs explained above, it is impossible to check information stored on data through a communication channel.
- the programs may be embodied in other structures than those illustrated in FIG. 4 to include the basic blocks. However, to efficiently secure data, it is required that the programs be programmed meticulously so that the OS is secured.
- the OS region in the software structure of FIG. 4 includes a memory recovery region 410 .
- the memory recovery region 410 is provided to guarantee whether or not the update is successfully achieved according to the process of updating the condition information of the unit 200 .
- the CPU 220 of the unit 200 backs up previously recorded values within the memory recovery region 410 , and sets a start flag.
- the main controller 110 accesses the CPU 220 of the unit 200 so as to newly record condition information such as the amount of supplies or the number of sheets consumed when a print job is performed. If the power is cut off, or if the print job is terminated abnormally due to external noise before the recording is completed, the conventional CRUM may not be able to determine whether new condition information is normally recorded. If such abnormal conditions are repeated, it may be difficult to trust the information, and to manage the unit even using the CRUM.
- the OS according to an exemplary embodiment of the present general inventive concept provides the memory recovery region 410 in the OS.
- the CPU backs up the previously recorded data in the memory recovery region 410 prior to recording data, and sets a start flag to 0. If a data writing operation is processed, the start flag is continuously updated according to the data writing operation.
- the CPU checks the start flag after the power is turned on, or after a system is stabilized. The CPU thus determines whether the data is written normally according to the variation conditions of the start flag value. If the difference between the start flag value and the initially set value is not significant, the CPU determines that data writing has failed, and rolls back the data to the previously recorded values. On the other hand, if the start flag value coincides approximately with a final value, the CPU determines that the currently recorded data is correct. Therefore, even when the power is turned off, or when the system operates abnormally, the data written in the unit 200 may be trusted.
- FIG. 5 is a flowchart illustrating a method of operating the replaceable unit and the image forming apparatus according to an exemplary embodiment of the present general inventive concept.
- the CPU of the unit 200 determines whether a specific event is generated in operation S 510 .
- the specific event may include a case in which the image forming apparatus 100 is powered on, or a case in which the unit 200 or components including the unit 200 are mounted in the image forming apparatus 100 .
- the unit 200 performs its own initialization in operation S 520 .
- the initialization includes calculating secret information required for data communication with the image forming apparatus after initialization, setup of a communication channel, initialization of memory values, checking remaining amounts of toner or ink, confirmation of the replacement time, or various other processes.
- the main controller 110 of the image forming apparatus 100 transmits a command to attempt authentication between the main controller 110 and the CPU 220 in operation S 530 . If the main controller 110 does not receive a response from the CPU 220 in operation S 540 , the main controller 110 repeatedly transmits the command until the response is received.
- the main controller 110 authenticates communication with the CPU 220 in operation S 550 , as explained above.
- FIG. 6 is a schematic view provided to explain a process of changing a cryptographic algorithm by the unit 200 according to an exemplary embodiment of the present general inventive concept.
- the unit 200 may support ARIA, Triple Data Encryption Standard (TDES), SEED, and Advanced Encryption Standard (AES) symmetric key algorithms, for example. Determining the process of which algorithm to use may take place when a key write system in a key management system (KMS) 600 generates key generating data.
- KMS key management system
- the cryptographic algorithm may be changed by acquiring a new key from the KMS to which another of the four cryptographic algorithms is applied instead of manufacturing a new unit 200 .
- the image forming apparatus 100 may also support ARIA, TDES, SEED, and AES symmetric key algorithms in addition to an RSA asymmetric key algorithm. Accordingly, even if the cryptographic algorithm applied to the unit 200 is changed, the image forming apparatus 100 changes a cryptographic algorithm in response, and performs the authentication and cryptographic data communication.
- the cryptographic algorithms may be changed conveniently by changing a key value in contrast to the conventional art, which requires a chip to be replaced.
- FIG. 7 is a flowchart provided to explain a method of performing authentication and cryptographic data communication according to an exemplary embodiment of the present general inventive concept.
- an image forming apparatus 100 transmits a command to request authentication along with a random value R 1 in operation S 710 .
- the unit 200 If the request to perform authentication is received, the unit 200 generates a session key, using the received random value R 1 and the random value R 2 generated by the unit 200 in operation S 715 , and generates a message authentication code (MAC) using the generated session key in operation S 720 .
- MAC message authentication code
- the first MAC generated by the unit 200 is a pre-stored electronic signature information, and along with the random value R 2 , are transmitted to the image forming apparatus 100 in operation S 725 .
- the image forming apparatus 100 verifies the received electronic signature of the first MAC generated by the unit 200 by comparing the received electronic signature information with pre-stored electronic signature information in operation S 730 . To verify the received electronic signature, the image forming apparatus 100 may store electronic signature information of each unit, if a plurality of units are mounted in the image forming apparatus 100 .
- the image forming apparatus 100 If the received electronic signature is verified, the image forming apparatus 100 generates a session key by combining the pre-generated random value R 1 with the received random value R 2 in operation S 735 , and a second MAC is generated by the image forming apparatus 100 using the generated session key in operation S 740 .
- the image forming apparatus 100 compares the generated second MAC of the image forming apparatus 100 with the received first MAC of the replaceable unit 200 in order to determine whether the two different MACs coincide in operation S 745 .
- the authentication is completed according to the verification of the received first MAC of the replaceable unit 200 . If the authentication is successfully performed, the cryptographic data communication may be performed.
- the image forming apparatus 100 uses the same key and cryptographic algorithm as those of the unit 200 .
- the key may be the session key described above.
- the image forming apparatus 100 If the received first MAC of the replaceable unit 200 is completely verified, the image forming apparatus 100 generates a third MAC by applying the key and cryptographic algorithm to data when generating a communication message in operation S 750 .
- the image forming apparatus 100 transmits the communication message including the third MAC to the unit 200 in operation S 755 .
- the unit 200 extracts the data portion from the received communication message, and generates a fourth MAC by applying the above key and cryptographic algorithm to the data in operation S 760 .
- the unit 200 extracts a third MAC portion from the received communication message, and performs authentication by comparing the extracted third MAC portion with the fourth MAC calculated by the unit 200 in operation S 765 .
- the communication message is treated as a valid communication message, and thus the operation corresponding to the message is performed in operation S 770 .
- the communication message is treated as an invalid communication message, and is discarded.
- the unit 200 may be implemented in diverse forms such as a semiconductor chip or semiconductor chip package, a normal unit, or a replaceable unit.
- the present general inventive concept can also be embodied as computer-readable codes on a computer-readable medium.
- the computer-readable medium can include a computer-readable recording medium and a computer-readable transmission medium.
- the computer-readable recording medium is any data storage device that can store data as a program which can be thereafter read by a computer system. Examples of the computer-readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, and optical data storage devices.
- the computer-readable recording medium can also be distributed over network coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion.
- the computer-readable transmission medium can transmit carrier waves or signals (e.g., wired or wireless data transmission through the Internet). Also, functional programs, codes, and code segments to accomplish the present general inventive concept can be easily construed by programmers skilled in the art to which the present general inventive concept pertains.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Biomedical Technology (AREA)
- Power Engineering (AREA)
- Technology Law (AREA)
- Control Or Security For Electrophotography (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Studio Devices (AREA)
- Electrophotography Configuration And Component (AREA)
- Facsimiles In General (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Description
- This application is a Continuation Application of U.S. patent application Ser. No. 12/372,035, filed Feb. 17, 2009 in the U.S. Patent and Trademark Office, which claims priority under 35 U.S.C. §119 (a) from Korean Patent Application Nos. 10-2008-0019844 and 10-2008-0063071, filed on Mar. 3, 2008 and Jun. 30, 2008 respectively, in the Korean Intellectual Property Office, the disclosures of which are incorporated herein by reference in their entirety.
- 1. Field of the Invention
- The present general inventive concept relates to a unit including a built-in central processing unit (CPU) and an image forming apparatus using the same. More particularly, the present general inventive concept relates to a unit which becomes more secure by having a CPU with an operating system (OS), and an image forming apparatus using the same.
- 2. Description of the Related Art
- As computers have become widely used, peripherals have also become widespread. Examples of peripherals are image forming apparatuses such as printers, scanners, copiers, and multifunction devices.
- Image forming apparatuses use ink or toner to print images onto paper. Ink and toner are used whenever image forming operations are performed, until the ink toner is finally exhausted. If ink or toner is empty, a user must replace a unit for storing the ink or toner. Such components which are replaceable while using the image forming apparatuses are referred to as consumables or replaceable units.
- Among replaceable units, some units other than units which have to be replaced when the ink or toner is exhausted must be replaced after being used for a predetermined period of time. This is so even if ink or toner are not exhausted since properties of the units change after the predetermined period of time and the printing quality is thus reduced.
- For example, a laser image forming apparatus includes a charge unit, a transfer unit, a fusing unit, and so on, and diverse kinds of rollers and belts used in each unit may be worn out or damaged due to use over a limited life span. As a result, the printing quality may be remarkably deteriorated. Therefore, the user has to replace such replaceable units at appropriate times.
- The time to replace replaceable units can be determined using a use state index. The use state index represents an index to indicate the degrees of use of the image forming apparatus, for example, the number of pieces of paper printed by the image forming apparatus and the number of dots forming an image. The image forming apparatus can determine the time to replace replaceable units by measuring the number of pieces of paper printed by the image forming apparatus or the number of dots.
- Recently, in order for the user to precisely determine the time to replace each replaceable unit, each replaceable unit has included a built-in customer replaceable unit monitoring memory (CRUM memory). The use state index of each replaceable unit is stored in the CRUM memory. Accordingly, even if each replaceable unit is separated and used in different image forming apparatuses, the use state of each replaceable unit can be determined precisely.
- However, a conventional replaceable unit having a CRUM memory has a problem that users can easily access the CRUM memory. Information stored in the CRUM memory is very diverse, spanning from basic information regarding the manufacturer to information regarding the recent use state. If the information is modified, it is difficult to receive after-sale service and calculate the adequate time to replace the replaceable unit, resulting in degradation of image forming operations. In particular, if information regarding the manufacturer is modified, it is impossible to determine whether it is authentic and thus is difficult to manage the replaceable unit.
- The present general inventive concept provides a unit which becomes more secure by having a built-in CPU with an operating system (OS), and an image forming apparatus using the same.
- Additional features and utilities of the present general inventive concept will be set forth in part in the description which follows and, in part, will become obvious from the description, or may be learned by practice of the general inventive concept.
- An embodiment of the present general inventive concept may be achieved by providing a chip which is mountable on a replaceable unit used in an image forming apparatus, the chip including a central processing unit (CPU) with an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, to perform authentication communication with the main body of the image forming apparatus using the OS of the CPU.
- The CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- The initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- The CPU may perform cryptographic data communication when the authentication is completed.
- When an authentication request is received from the main body of the image forming apparatus, the CPU may generate message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- When an authentication request and a first random value are received from the main body of the image forming apparatus, the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- When the image forming apparatus is powered on, or when a replacement unit with the chip is mounted on the image forming apparatus, the CPU may perform the initialization according to the OS of the CPU, and does not respond to a command from the main body of the image forming apparatus before the initialization is completed, and perform the authentication when the initialization is completed.
- The chip may further include a memory unit to store information regarding at least one of the chips, a replaceable unit, a customer replaceable unit monitoring memory (CRUM) unit mounted on the replaceable unit in which the chip is able to be mounted, and the OS of the CPU.
- The OS of the CPU may drive at least one of the chip, the CRUM unit, and the replaceable unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize one state of the chip, the CRUM unit, and the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- The chip may further include a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication on the main body of the image forming apparatus by applying a preset cryptographic algorithm among a plurality of cryptographic algorithms.
- The cryptographic algorithm applied to the authentication may be changeable.
- The CPU may receive values of usage degrees of each of consumables used for the image forming job from the main body of the image forming apparatus when the image forming job is executed using the replaceable unit, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing a CRUM unit which can be used for an image forming apparatus, the CRUM unit including a memory unit to store information regarding a unit on which the CRUM unit is mounted, and a CPU to manage the memory unit using the operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus.
- The CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- The initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- The OS of the CPU may drive the CRUM unit or a replaceable unit including the CRUM unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize the state of the CRUM unit or the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- The CPU may perform the authentication, and performs cryptographic data communication when the authentication is completed.
- When an authentication request is received from the main body of the image forming apparatus, the CPU may generate a message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- When an authentication request and a first random value are received from the main body of the image forming apparatus, the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- When the image forming apparatus is powered on or a unit mounted with the CRUM unit is mounted on the image forming apparatus, the OS of the CPU may perform the initialization, and does not respond to a command from the main body of the image forming apparatus before the initialization is completed.
- The CRUM unit may further include an interface unit to connect the image forming apparatus to the CPU, a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication on the image forming apparatus by applying the preset cryptographic algorithm among a plurality of cryptographic algorithms.
- The cryptographic algorithm applied to the authentication may be changeable.
- The CPU may receive values of usage degrees of each of consumables used for the image forming job when the image forming job is executed, from the main body of the image forming apparatus, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing a replaceable unit which is also mountable on an image forming apparatus, the replaceable unit including a memory unit to store information on the replaceable unit, and a CPU to manage the memory unit using an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication on the main body of an image forming apparatus.
- The CPU may perform initialization using the OS of the CPU, operating separately from the main body of the image forming apparatus.
- The initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- The OS of the CPU may drive the replaceable unit, and the OS of the CPU may be software that executes at least one of an initialization operation to independently initialize the state of the replaceable unit, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- The CPU may perform the cryptographic data communication when the authentication between the main body of the image forming apparatus and the replaceable unit is completed.
- When an authentication request is received from the main body of the image forming apparatus, the CPU may generate a message authentication code (MAC) and transmit the generated MAC and unique digital signature information to the main body of the image forming apparatus.
- When an authentication request and a first random value are received from the main body of the image forming apparatus, the CPU may generate a second random value independently and generate a session key using the first random value, and after generating a message authentication code (MAC) using the generated session key, the CPU may transmit the generated MAC, the second random value, and the unique digital signature information to the main body of the image forming apparatus.
- When the image forming apparatus is powered on or the replaceable unit is mounted on the image forming apparatus, the CPU may perform the initialization according to its own OS, and may not respond to a command from the main body of the image forming apparatus before the initialization is completed.
- The replaceable unit may further include an interface unit to connect the image forming apparatus to the CPU, a tamper detector to respond to physical hacking attempts, and a crypto unit to allow the CPU to perform the authentication or the cryptographic data communication with the image forming apparatus by applying the set cryptographic algorithm among a plurality of cryptographic algorithms.
- The cryptographic algorithm applied to the authentication may be changeable.
- The CPU may receive values of usage degrees of each of consumables used for the image forming job when the image forming job is executed, from the main body of the image forming apparatus, and the CPU adds the values to the information on the usage degrees of each of consumables stored in the memory unit, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- An embodiment of the present general inventive concept may be achieved by providing an image forming apparatus including a main controller, and at least one unit which includes a memory unit to store information and a CPU to manage the memory unit using the operating system (OS) of the CPU, operating separately from an OS of the main controller, and to perform at least one of authentication and cryptographic data communication with the main controller.
- The CPU may perform initialization using the OS of the CPU, operating separately from the main controller.
- The initialization may include at least one task from among initial driving of application programs, calculation of secret information required for data communication with the main body of the image forming apparatus after the initialization, communication channel set-up, initialization of memory values, checking of its own replacement period, setting of internal register values, and setting of internal/external clock signals.
- The at least one unit may perform the authentication on the main controller using a preset cryptographic algorithm, the cryptographic algorithm being changeable.
- The main controller may request authentication to the CPU of the at least one unit, and when digital signature information and a MAC are transmitted from the CPU, the main controller may detect the digital signature information and the MAC to perform the authentication.
- The main controller may generate a first random value and then transmit the first random value and an authentication request to the CPU of the at least one unit, detect digital signature information when the digital signature information is received, receive a first MAC and a second random value from the CPU in response to the authentication request, independently generate a session key and a second MAC using the first and second random values, and compare and detect the generated second MAC and the received first MAC.
- The main controller may receive the unique digital signature information set for each unit of the at least one unit and perform the authentication, and perform the cryptographic data communication with the respective CPUs of each unit when the authentication has succeeded.
- The main controller may perform the authentication by applying a RSA asymmetric key algorithm and one of ARIA, triple data encryption standards (TDES), SEED and advanced encryption standards (AES) symmetric key algorithms, and the CPU of the unit may perform the authentication by applying one of the ARIA, TDES, SEED, AES symmetric key algorithms.
- The unit may further include a crypto unit to allow the CPU to perform the authentication or the cryptographic data communication with the main controller of the image forming apparatus by applying the set cryptographic algorithm among a plurality of cryptographic algorithms and a tamper detector to respond to physical hacking attempts.
- The main controller may be connected to the at least one unit through one serial I/O channel, and be accessed to the at least one unit using individual addresses given to each unit.
- When the job is executed, the main controller may measure values of usage degrees of each of consumables used for the job, transmit the measured values to each CPU of the at least one unit, add the values to the information on the usage degrees of each of consumables pre-stored in each CPU, and then refreshes the information on the usage degrees of each of the consumables stored in the memory unit.
- The OS of the CPU may drive the unit, and the OS of the CPU may be software that executes at least one of an initialization operation, a processing operation to execute a public cryptographic algorithm, and a mutual authentication operation with the main body of the image forming apparatus.
- The unit may be one of a replaceable unit directly associated with an image forming job of the image forming apparatus, a CRUM unit mountable on the replaceable unit, and a chip mountable on the CRUM unit.
- An embodiment of the present general inventive concept may also be achieved by providing a computer readable medium to contain computer-readable codes as a program to perform a method, the method including performing authentication communication with a main body of an image forming apparatus using an operating system (OS) of a central processing unit (CPU), which operates separately from an OS of the image forming apparatus.
- An embodiment of the present general inventive concept may also be achieved by providing a semiconductor chip package which is mountable on a replaceable unit in an image forming apparatus having an operating system, the semiconductor chip including a memory to store data, and a central processing unit (CPU) to process the data such that the processed data is transmitted to the operating system (OS) of the image forming apparatus.
- The memory and the processor are disposed in a single integrated body.
- An embodiment of the present general inventive concept may also be achieved by providing a computer readable medium containing computer-readable codes as a program to perform authentication communication with a main body of an image forming apparatus using an operating system (OS) of a central processing unit (CPU), which operates separately from an OS of the image forming apparatus.
- An embodiment of the present general inventive concept may also be achieved by providing a replaceable unit which is mountable on an image forming apparatus to be used in an image forming job, the replaceable unit including a memory unit to store information on the replaceable unit, and a CPU to manage the memory unit using an operating system (OS) of the CPU which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus, wherein random values are used upon transmitting information or commands for authentication between the CPU and the main body of the image forming apparatus.
- An embodiment of the present general inventive concept may also be achieved by providing an image forming apparatus, including a main controller, and at least one unit which includes a memory unit to store information and a CPU to manage the memory unit using an operating system (OS) of the CPU that operates separately from an OS of the main controller, and to perform authentication communication with the main controller, wherein random values are used upon transmitting information or commands for authentication, between the CPU and the OS of the main controller of the image forming apparatus.
- An embodiment of the present general inventive concept may also be achieved by providing a chip which is mountable on a replaceable unit used in an image forming apparatus, the chip including a central processing unit (CPU) with an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, to perform authentication communication with a main body of an image forming apparatus, using the OS of the CPU, and a memory unit to store information regarding at least one of the chip, a customer replaceable unit monitoring (CRUM) unit, a replaceable unit with the CRUM unit, and the OS of the CPU, wherein the OS of the CPU is provided in the memory unit within the chip or in memory external to the chip.
- An embodiment of the present general inventive concept may also be achieved by providing a customer replaceable unit monitoring (CRUM) unit which can be used in an image forming apparatus, the CRUM unit including a memory unit to store information regarding a unit on which the CRUM unit is mounted, and a CPU to manage the memory unit using an operating system (OS) of the CPU, which operates separately from an OS of the image forming apparatus, and to perform authentication communication with the main body of an image forming apparatus, wherein the OS of the CPU comprises a memory recovery region configured to determine whether an update is successfully achieved according to a process of updating the condition information of the CRUM unit.
- According to exemplary embodiments of the present general inventive concept, a CPU with its own operation system (OS) is mounted in the unit, so the unit can manage the memory unit independently. The unit may be a chip, a CRUM unit, or replaceable unit. The OS is driven so that initialization, cryptographic algorithm driving, and authentication with the main body of the image forming apparatus may be performed.
- Even when a master key is not stored in the image forming apparatus having the unit, the image forming apparatus may perform authentication or cryptographic data communication with the unit. Therefore, a master key can be prevented from being leaked. The authentication or cryptographic data communication may be performed using a MAC generated based on a random value, and electronic signature information. The authentication is performed by applying both symmetric and asymmetric key algorithms, so the cryptography provides high level data security.
- A plurality of cryptographic algorithms may be selectively applied to the authentication and the cryptographic data communications. Even if the currently used cryptographic algorithm is attacked by physical hacking, the attack may be prevented by replacing the currently used key with a key applying the other cryptographic algorithm without replacing the unit with a new unit.
- If a plurality of units are used, electronic signature information is set for each unit. Individual addresses are given to each unit, and thus the unit may be connected to the image forming apparatus through a serial interface. Authentication and cryptographic data communication between the plurality of units is efficiently achieved.
- If an image forming job is completed, the image forming apparatus measures the usage degrees of each of consumables used for the image forming job, and transmits the measured values to each of the plurality of units. Therefore, incorrect information regarding the usage degrees of each of the consumables used is prevented from being recorded due to errors.
- As a result, data stored in the memory unit built-in the unit of the image forming apparatus is prevented from being copied or duplicated, and security of the data is enhanced. Users are also protected from using an uncertified unit.
- These and/or other features and utilities of the present general inventive concept will become apparent and more readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
-
FIG. 1 is a schematic block diagram illustrating a configuration of an image forming apparatus including a replaceable unit according to an exemplary embodiment of the present general inventive concept; -
FIG. 2 is a detailed block diagram illustrating a configuration of the replaceable unit according to an exemplary embodiment of the present general inventive concept; -
FIG. 3 is a schematic block diagram illustrating a configuration of an image forming apparatus according to an exemplary embodiment of the present general inventive concept; -
FIG. 4 is a schematic block diagram illustrating a configuration of software which is built into the image forming apparatus and the replaceable unit according to an exemplary embodiment of the present general inventive concept; -
FIG. 5 is a flowchart illustrating a method of operating the replaceable unit and the image forming apparatus according to an exemplary embodiment of the present general inventive concept; -
FIG. 6 is a flowchart illustrating a process of changing cryptographic algorithms by the replaceable unit according to an exemplary embodiment of the present general inventive concept; and -
FIG. 7 is a flowchart illustrating a method of performing authentication and cryptographic data communications between the image forming apparatus and the replaceable unit according to an exemplary embodiment of the present general inventive concept. - Reference will now be made in detail to the embodiments of the present general inventive concept, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The embodiments are described below in order to explain the present general inventive concept by referring to the figures.
-
FIG. 1 is a schematic block diagram illustrating a configuration of an image forming apparatus including a replaceable unit according to an exemplary embodiment of the present general inventive concept. As illustrated inFIG. 1 , theimage forming apparatus 100 includes amain controller 110, and aunit 200 may be built into theimage forming apparatus 100. Theimage forming apparatus 100 may be a copier, a printer, a multifunction peripheral, a facsimile machine, or a scanner. - The
image forming apparatus 100 may include an (OS) 115 to control operations of theimage forming apparatus 100. Theunit 200 represents a component which is designed to be installed and used independently. More specifically, theunit 200 may be a replaceable unit including at least onereplaceable element 215 which is formed in the image forming apparatus and directly intervenes in the image forming operation. For example, the at least onereplaceable element 215 of thereplaceable unit 200 may be a toner or ink cartridge, a charge unit, a transfer unit, a fusing unit, an organic photo conductor (OPC), a feeding unit, or a feeding roller, etc. - Furthermore, the
unit 200 may be any other component which is necessary for theimage forming apparatus 100, and is replaceable during use. That is, theunit 200 may be a customer replaceable unit monitor (CRUM) which can monitor and manage the state of a component by being included in the replaceable unit, or may be a chip built into the CRUM. Theunit 200 can be implemented in diverse forms, but aunit 200 implemented as a replaceable unit is described hereinbelow for convenience of description. - The
main controller 110 may have an interface to communicate with an external device (not illustrated) to receive data and may perform an image forming operation using the received data. Themain controller 110 may also be connected to a facsimile unit or a scanning unit, for example, to receive or transmit data corresponding to the image forming operation. - The
image forming apparatus 100 may include animage forming unit 150 to perform the image forming operation using theunit 200. Theunit 200 can be part of theimage forming unit 150 when being installed in a body of theimage forming apparatus 100. Themain controller 110 can control thememory unit 210 and theimage forming unit 150 to feed a medium into the image forming apparatus to form an image on the medium, and to discharge the medium. - As illustrated in
FIG. 1 , theunit 200 includes amemory unit 210 and a central processing unit (CPU) 220. - The
memory unit 210 stores diverse types of information regarding theunit 200, and, more specifically, stores unique information such as information regarding the manufacturer of theunit 200, information regarding the time of manufacture, a serial number or a model number, diverse programs, information regarding an electronic signature, state information regarding the state of use (for example, how many pieces of paper have been printed up until the present time, what the remaining printable capacity is, or how much toner is left). - For example, the
memory unit 210 may store information as in the following Table 1. -
General Information OS Version CLP300_V1.30.12.35 02-22-2007 SPL-C Version 5.24 06-28-2006 Engine Version 6.01.00(55) USB Serial Number BH45BAIP914466B. Set Model DOM Service Start Date 2007-09-29 Option RAM Size 32 Mbytes EEPROM Size 4096 bytes USB Connected (High) Consumables Life Total Page Count 774/93 Pages(Color/mono) Fuser Life 1636 Pages Transfer Roller Life 864 Pages Tray1 Roller Life 867 Pages Total Image Count 3251 Images Imaging Unit/Dye Roller Life 61 Images/19 Pages Transfer Belt Life 3251 Images Toner Image Count 14/9/14/19 Images(C/M/Y/K) Toner Information Toner Remains Percent 99%/91%/92%/100% (C/M/Y/K) Toner Average Coverage 5%/53%/31%/3% (C/M/Y/K) Consumables Information Cyan Toner SAMSUNG(DOM) Magenta Toner SAMSUNG(DOM) Yellow Toner SAMSUNG(DOM) Black Toner SAMSUNG(DOM) Imaging unit SAMSUNG(DOM) Color Menu Custom Color Manual Adjust(CMYK: 0,0,0,0) Setup Menu Power Save 20 Minutes Auto Continue On Altitude Adj. Plain - As illustrated in Table 1 above, the
memory unit 210 may store diverse information regarding life span of consumables, and setup menus, as well as schematic information regarding theunit 200. Thememory unit 210 may also store information of an operating system (OS) to process data stored therein such that themain controller 110 can control theimage forming unit 150 and theunit 200 to perform the image forming operation. - The
CPU 220 manages thememory unit 210 using an operating system (OS) of theCPU 220. The OS, which is provided to operate theunit 200, represents software to operate general application programs. Accordingly, theCPU 220 can perform self-initialization using the OS. - In greater detail, the
CPU 220 performs initialization at the time of particular events, for example, when theimage forming apparatus 100 including theunit 200 is turned on, or when theunit 200 or a component including theunit 200, such as a replaceable unit is attached to or detached from theimage forming apparatus 100. Initialization includes initial driving of diverse application programs used in theunit 200, calculation of secret information needed for data communications with the image forming apparatus after initialization, setup of a communication channel, initialization of a memory value, confirmation of a replacement time, setting of register values in theunit 200, and setting of internal and external clock signals. - Setting of register values represents setting function register values in the
unit 200 in order for theunit 200 to operate in the same state as the user previously set. In addition, setting of internal and external clock signals represents adjusting a frequency of an external clock signal provided from themain controller 110 of theimage forming apparatus 100 to a frequency of an internal clock signal to be used in theCPU 220 of theunit 200. - Confirmation of the replacement time represents checking the remaining amount of toner or ink in use, anticipating time when the toner or ink will be exhausted, and notifying the
main controller 110 of the time. If it is determined during initialization that the toner has already been exhausted, after completing initialization theunit 200 may be implemented to automatically notify themain controller 110 that operation cannot be performed. In other cases, since theunit 200 includes an OS of theCPU 220, diverse forms of initialization can be performed according to the type or characteristic of theunit 200. - Such initialization is performed by the
unit 200 itself, and thus is performed separately from initialization performed by themain controller 110 of theimage forming apparatus 100. - As described above, the
CPU 220 is built in theunit 200 and theunit 200 has its own OS, so if theimage forming apparatus 100 is turned on, themain controller 110 can check the remaining amount of consumables and the number of refills, which are stored in thememory unit 210, before requesting communication with theunit 200. Consequently, it takes a shorter time to inform themain controller 110 that consumables should be replaced. For example, if toner is insufficient, the user can turn on theimage forming apparatus 100, and convert theimage forming apparatus 100 directly into a toner saving mode. The user can also perform the same operation even when only one particular toner is insufficient. - The
CPU 220 does not respond to commands of themain controller 110 until initialization is completed. Themain controller 110 periodically transmits commands to theCPU 220 until themain controller 110 receives a response from theCPU 220. - If the
main controller 110 receives a response, that is, an acknowledgement, authentication is initiated between themain controller 110 and theCPU 220. - In this case, the OS in the
unit 200 enables authentication by interaction between theunit 200 and theimage forming apparatus 100. However, in order for a conventional image forming apparatus to perform authentication, the main controller of the image forming apparatus unilaterally accesses the unit, identifies unique information for authentication, and compares the unique information with stored information. - However, in the present general inventive concept, the
main controller 110 in theimage forming apparatus 100 performs its own initialization separately from initialization of theunit 200. Initialization of theunit 200 is completed first due to differences in the size of the systems. If initialization of theunit 200 is completed, theunit 200 can drive a cryptographic algorithm using the OS. More specifically, theunit 200 may drive a cryptographic algorithm in response to a command of themain controller 110 so that interactive authentication between themain controller 110 and theunit 200, not unilateral authentication of themain controller 110, can be performed. Consequently, security of authentication increases. - Such authentication is not limited to the example described above and may be performed in diverse forms. For example, the
main controller 110 may receive a response from theCPU 220 and transmit a command to theCPU 220 requesting authentication. In this case, as illustrated inFIGS. 1 and 7 , a random value R1 can be transmitted to theCPU 220 of thereplaceable unit 200 along with the command. TheCPU 220 receives the request for authentication and the random value R1, generates a session key using the random value R1, generates a first message authentication code (MAC) using the generated session key, and transmits the generated first MAC, pre-stored electronic signature information, and a random value R2 to themain controller 110. - If the
main controller 110 identifies the authenticity by verifying the first MAC, the received electronic signature information, themain controller 110 generates a session key using the received random value R2 and the pre-generated random value R1 and generates a second MAC using the session key. Finally, themain controller 110 verifies the second MAC by identifying whether or not the generated second MAC is the same as the received first MAC. As a result, themain controller 110 can determine if authentication has been successfully performed. As described above, since random values are used upon transmitting information or commands for authentication, malicious hacking by a third party can be prevented. - If authentication is successfully performed, cryptographic data communications is performed between the
main controller 110 and the CPU of theunit 200. As described above, since theunit 200 has its own OS, a cryptographic algorithm can be executed. Therefore, data validity can be determined by applying the cryptographic algorithm to the data received from theimage forming apparatus 100. As a result of this determination, if the data is valid, theunit 200 receives the data and performs an operation to process the data. If the data are not valid, theunit 200 may discard the data as soon as receiving the data. In this case, theunit 200 may notify themain controller 110 that there exists a problem in data communications. - The cryptographic algorithm may use a public standard cryptographic algorithm. Such a cryptographic algorithm can be modified when an encryption key is opened or when security needs to be reinforced.
- In the above exemplary embodiment of the present general inventive concept, since the
unit 200 has its own OS, and its own initialization, authentication and cryptographic data communications between theunit 200 and theimage forming apparatus 100 can be performed efficiently. -
FIG. 2 is a detailed block diagram illustrating thereplaceable unit 200 of theimage forming apparatus 100 illustrated inFIG. 1 . Thereplaceable unit 200 ofFIG. 2 includes acrypto unit 230, atamper detector 240 and aninterface unit 250 in addition to the previously discussedmemory unit 210 andCPU 220. Additionally, thereplaceable unit 200 may further include a clock unit (not illustrated) to output a clock signal or a random value generator (not illustrated) to generate random values for authentication. Thereplaceable unit 200 discussed herein may include less components or more components, depending on the application. Further, if thereplaceable unit 200 is implemented as a semiconductor chip or semiconductor chip package, the chip or chip package may include either theCPU 220 by itself, or may include both thememory unit 210 andCPU 220. If the chip includes only theCPU 220, an OS executed by theCPU 220 may be provided by an external memory. - The
crypto unit 230 supports a cryptographic algorithm and causes theCPU 220 to perform authentication or cryptographic data communication with themain controller 110. Specifically, thecrypto unit 230 may support one of four cryptographic algorithms, including ARIA, triple data encryption standard (TDES), SEED, and advanced encryption standard (AES) symmetric key algorithms. - To perform authentication or cryptographic data communication, the
main controller 110 also supports the four cryptographic algorithms. Accordingly, themain controller 110 may determine which cryptographic algorithm is applied by thereplaceable unit 200, may perform the authentication using the determined cryptographic algorithm, and may then perform the cryptographic data communication with theCPU 220. As a result, thereplaceable unit 200 may be easily mounted in theimage forming apparatus 100 so that the cryptographic data communication may be performed, even when a key to which a certain cryptographic algorithm is applied is generated. - The
tamper detector 240 prevents various physical hacking attacks, namely tampering. In more detail, if an attack is detected by monitoring operating conditions such as the voltage, temperature, pressure, light or frequency, thetamper detector 240 may delete data relating to the attack, or may physically prevent the attack. In this situation, thetamper detector 240 may include an extra power source to supply power to maintain the operation thereof. The attack may be a decap attack which can be a potentially damaging attack to theCRUM unit 200, for example. - As described above, the
replaceable unit 200 includes thecrypto unit 230 andtamper detector 240, so it is possible to systematically secure data using either or both hardware and software. - Referring to
FIG. 2 , thememory unit 210 may include at least one of anOS memory 211, anon-volatile memory 212 and avolatile memory 213. - The
OS memory 211 stores an OS to operate thereplaceable unit 200. Thenon-volatile memory 212 stores data in non-volatile form and thevolatile memory 213 is used as a temporary storage space required for operations. While thememory unit 210 includes theOS memory 211,non-volatile memory 212 andvolatile memory 213 as illustrated inFIG. 2 , some of these memories may be built into theCPU 220 as internal memories. TheOS memory 211,non-volatile memory 212 andvolatile memory 213 may be implemented according to a design for security such as address/data line scrambling or bit encryption, differently from general memories. - The
non-volatile memory 212 may store a variety of information, such as digital signature information, information regarding various cryptographic algorithms, information regarding the state of use of the replaceable unit 200 (for example, information regarding the remaining toner level, the time at which toner needs to be replaced, or the number of remaining sheets to be printed), unique information (for example, information regarding the manufacturer of thereplaceable unit 200, information regarding the date and time of manufacture, serial number or model number), or repair service information. - The
interface unit 250 connects theCPU 220 and themain controller 110. Theinterface unit 250 may be implemented as a serial interface or wireless interface. For example, a serial interface has an advantage of cost reduction due to the use of fewer signals than a parallel interface, and the serial interface is suitable for an operating condition where a large amount of noise occurs, such as a printer. - The components illustrated in the
FIG. 2 are connected to each other via a bus, but this is merely an example. Accordingly, it is to be understood that the components according to aspects of the present general inventive concept may be connected directly without the bus. -
FIG. 3 is a block diagram illustrating theimage forming apparatus 100 according to an exemplary embodiment of the present general inventive concept. Theimage forming apparatus 100 ofFIG. 3 may include anOS 115, amain controller 110, astorage unit 120, animage forming unit 150, and a plurality of units 200-1, 200-2, . . . , 200-n. The plurality of units 200-1, 200-2, . . . , 200-n ofFIG. 3 may be CRUM units, semiconductor chips, semiconductor chip packages, or replaceable units. For illustration purposes only, the plurality of units 200-1, 200-2, . . . , 200-n are hereinafter described as replaceable units. - If a single system requires various consumables, a plurality of units are also required. For example, if the
image forming apparatus 100 is a color printer, four color cartridges, namely cyan (C), magenta (M), yellow (Y) and black (K) cartridges, are mounted in the color printer in order to express desired colors. Additionally, the color printer may include other consumables. Accordingly, if a large number of units are required, each of the units requires its own input/output (I/O) channel, so the arrangement can be inefficient. Therefore, as illustrated inFIG. 3 , a single serial I/O channel may be used to connect each of the plurality of units 200-1, 200-2, . . . , 200-n to themain controller 110. Themain controller 110 may access each of the plurality of units 200-1, 200-2, . . . , 200-n using different addresses assigned to each of the plurality of units 200-1, 200-2, . . . , 200-n. - When the
main controller 110 is turned on or when the plurality of units 200-1, 200-2, . . . , 200-n are mounted in theimage forming apparatus 100, if each of the plurality of units 200-1, 200-2, . . . , 200-n is completely initialized, authentication is performed using unique digital signature information for each of the plurality of units 200-1, 200-2, . . . , 200-n. - If authentication is successful, the
main controller 110 performs cryptographic data communication with a plurality of CPUs (not illustrated) in the plurality of units 200-1, 200-2, . . . , 200-n, and stores information regarding the use history in a plurality of memory units (not illustrated) in the plurality of units 200-1, 200-2, . . . , 200-n. Themain controller 110 and plurality of CPUs may act as master and slave. - Here, the cryptographic data communication is performed by transmitting data, which a user desires to transmit, together with a MAC generated by encrypting the data using a preset cryptographic algorithm and key. Since the data varies every time it is transmitted, the MAC may also change. Accordingly, even when a third party intervenes in the data communication operation and finds a MAC, it is impossible for the third party to hack subsequent data communication operations using the MAC. Therefore, the security of data communication can be increased.
- If the cryptographic data communication is completed, the channel connected between the
main controller 110 and CPUs may be cut. - The
storage unit 120 stores a variety of information including key values and a plurality of cryptographic algorithms required for authentication of each of the plurality of units 200-1, 200-2, . . . , 200-n. - The
main controller 110 performs authentication and cryptographic data communication using the information stored in thestorage unit 120. Specifically, themain controller 110 performs the authentication and the cryptographic data communication by applying an RSA asymmetric key algorithm and one of the ARIA, TDES, SEED, AES symmetric key algorithms, for example. Therefore, both asymmetric and symmetric authentication processes are performed, so it is possible to increase the cryptographic level, relative to the conventional art. - While
FIG. 3 shows thestorage unit 120 as a single unit, thestorage unit 120 may include a storage unit to store a variety of cryptographic algorithm data, a storage unit required for other operations of themain controller 110, a storage unit to store information regarding the plurality of units 200-1, 200-2, . . . , 200-n, or a storage unit to store information regarding the use of the plurality of units 200-1, 200-2, . . . , 200-n (for example, sheets to be printed or remaining toner level). - The plurality of units 200-1, 200-2, . . . , 200-n mounted in the
image forming apparatus 100 ofFIG. 3 may have the configurations illustrated inFIG. 1 orFIG. 2 . Accordingly, after sending access commands to the plurality of CPUs of the plurality of units 200-1, 200-2, . . . , 200-n and receiving acknowledge signals, themain controller 110 may access the plurality of units 200-1, 200-2, . . . , 200-n. Therefore, the plurality of units according to an exemplary embodiment of the present general inventive concept differ from a conventional scheme capable of accessing CRUM data that uses simple data writing and reading operations. - If the
image forming apparatus 100 starts an image forming job, themain controller 110 may measure values of usage degrees of each of consumables used for the job, and may transmit the measured degrees to each of the plurality of units 200-1, 200-2, . . . , 200-n. In more detail, theimage forming apparatus 100 may add the measured degrees of consumables used to previously stored information on the use of consumables, may transmit a result value to the plurality of units 200-1, 200-2, . . . , 200-n, and may refresh the information on the use of consumables. When the operation of transmitting the result value occurs in the related art, if incorrect data is transmitted due to errors, incorrect information on the usage degrees of each of consumables used may be recorded on each of the plurality of units 200-1, 200-2, . . . , 200-n. For example, if a print job of 10 new sheets is completed after 1000 sheets are printed using a currently mounted developer cartridge, the total value is 1010 sheets. However, if some errors occur and if a value of 0 sheets is transmitted, a record of a print job of 0 sheets may be made on the plurality of units 200-1, 200-2, . . . , 200-n. As a result, it would be impossible for a user to accurately know the time at which the consumable needs to be replaced. - To solve this problem, in an embodiment of the general inventive concept, the
main controller 110 may measure usage degrees of each of consumables used for the job, and may transmit only the measured degrees of consumables used to each of the plurality of units 200-1, 200-2, . . . , 200-n. In this situation, themain controller 110 may transmit a value of 10 sheets, so the plurality of units 200-1, 200-2, . . . , 200-n may, through the use of their own CPUs, add the newly received value of ‘10 ’ to a value of ‘1000 ’, namely a previously stored value. Accordingly, the information on the use of consumables stored in the memory may be correctly updated to be ‘1010’. - Otherwise, the
main controller 110 may manage the information on the usage degrees of each of consumables used by itself by adding the measured amounts to the information on the use of consumables stored in thestorage unit 120, separately from the plurality of units 200-1, 200-2, . . . , 200-n. - In an embodiment of the present general inventive concept, the
main controller 110 may automatically update the information on the usage degrees of each of consumables stored in thestorage unit 120 while transmitting the information on the usage degrees of each of consumables used to the plurality of units 200-1, 200-2, . . . , 200-n every time the job is executed. - For example, when 100 sheets are printed using the plurality of units 200-1, 200-2, . . . , 200-n mounted in the
image forming apparatus 100, if 10 sheets are further printed while a single job is executed, themain controller 110 may send a value of ‘10 ’ to the plurality of units 200-1, 200-2, . . . , 200-n, and may add the value of ‘10 ’ to a value of ‘100 ’ previously stored in thestorage unit 120, so as to store history information indicating that ‘110 ’ sheets were printed. Accordingly, if a specific event occurs (for example, if theimage forming apparatus 100 is reset or if toner or ink is completely exhausted), or if a preset period occurs, themain controller 110 and plurality of units 200-1, 200-2, . . . , 200-n may compare their respective history information, through the use of their own CPUs, so it is possible to check whether data is normally recorded in each of the plurality of units 200-1, 200-2, . . . , 200-n. - In other words, accuracy or inaccuracy of the information on the use of consumables stored may be determined by comparing the information on the use of consumables stored in the
storage unit 120 to the information on the use of consumables stored in the plurality of units 200-1, 200-2, . . . , 200-n. In more detail, if the events occur or if the preset period occurs, themain controller 110 may transmit a command to request the information on the use of consumables to the plurality of units 200-1, 200-2, . . . , 200-n. In response to the request command, the CPUs of the plurality of units 200-1, 200-2, . . . , 200-n may transmit the information on the use of consumables stored therein to themain controller 110. - If the information on the use of consumables stored in the
storage unit 120 differs from the information on the use of consumables stored in the plurality of units 200-1, 200-2, . . . , 200-n, themain controller 110 may output an error message, or may harmonize information determined to be correct and may update the information on the use of consumables. - Additionally, if the information on the use of consumables stored in the
storage unit 120 differs from the information on the use of consumables stored in one of the plurality of units 200-1, 200-2, . . . , 200-n, themain control 110 may transmit a command to change the information on the use of consumables stored in thestorage unit 120, because there is a possibility that errors could occur when data is transmitted to thestorage unit 120. - The
image forming apparatus 100 may also include animage forming unit 150 to perform the image forming operation using the units 200-1, 200-2 . . . 200-n. The units 200-1, 200-2 . . . 200-n can be part of theimage forming unit 150 when being installed in a body of theimage forming apparatus 100. Themain controller 110 can control thememory units image forming unit 150 to feed a medium into the image forming apparatus to form an image on the medium and to discharge the medium. -
FIG. 4 is a hierarchy diagram illustrating aunit 200 and a host using theunit 200, that is, a configuration of software of an image forming apparatus according to an exemplary embodiment of the present general inventive concept. - Referring to
FIGS. 1 and 4 , software (a) of theimage forming apparatus 100 may include a security mechanism region to perform authentication and cryptography with theunit 200, and a software cryptographic operation region to perform software cryptography, in addition to general application programs, an application for managing data of each unit, a device driver which performs its own management, and a program for processing commands. - Software (b) of the
unit 200 may include a semiconductor IC chip region having various blocks to secure data, an App region to interface with host software, and an OS region to operate the regions. - The Device Software region of
FIG. 4 may include basic elements of an OS such as file management and data integrity programs. The OS region may further include operating blocks required to secure data including a security mechanism, software cryptographic operations and security countermeasure operations. The OS may include programs to control hardware for a security system including hardware memory management and hardware cryptographic management. As illustrated, the OS may include using a hardware input/output management function, as well as standard protocol, command processing, and application execution programs. The Applications (App) region of the Device Software region includes an application for managing replaceable units and a general security application. The semiconductor IC chip region may house the CPU, physical memory and input/output terminals and may further include a program to prevent tampering with other programs, a random number generation program, operating condition controls, a cryptographic process program, as well as a probability security mechanism. Since an application program to implement a function of CRUM is installed on the programs explained above, it is impossible to check information stored on data through a communication channel. The programs may be embodied in other structures than those illustrated inFIG. 4 to include the basic blocks. However, to efficiently secure data, it is required that the programs be programmed meticulously so that the OS is secured. - The OS region in the software structure of
FIG. 4 includes amemory recovery region 410. Thememory recovery region 410 is provided to guarantee whether or not the update is successfully achieved according to the process of updating the condition information of theunit 200. - Referring to
FIGS. 1 and 2 , when data is written on thememory unit 210, theCPU 220 of theunit 200 backs up previously recorded values within thememory recovery region 410, and sets a start flag. - For example, when the image forming job using the
unit 200 is completed, themain controller 110 accesses theCPU 220 of theunit 200 so as to newly record condition information such as the amount of supplies or the number of sheets consumed when a print job is performed. If the power is cut off, or if the print job is terminated abnormally due to external noise before the recording is completed, the conventional CRUM may not be able to determine whether new condition information is normally recorded. If such abnormal conditions are repeated, it may be difficult to trust the information, and to manage the unit even using the CRUM. - To prevent these occurrences, the OS according to an exemplary embodiment of the present general inventive concept provides the
memory recovery region 410 in the OS. In this case, the CPU backs up the previously recorded data in thememory recovery region 410 prior to recording data, and sets a start flag to 0. If a data writing operation is processed, the start flag is continuously updated according to the data writing operation. - In this state, if the data writing operation is terminated abnormally, the CPU checks the start flag after the power is turned on, or after a system is stabilized. The CPU thus determines whether the data is written normally according to the variation conditions of the start flag value. If the difference between the start flag value and the initially set value is not significant, the CPU determines that data writing has failed, and rolls back the data to the previously recorded values. On the other hand, if the start flag value coincides approximately with a final value, the CPU determines that the currently recorded data is correct. Therefore, even when the power is turned off, or when the system operates abnormally, the data written in the
unit 200 may be trusted. -
FIG. 5 is a flowchart illustrating a method of operating the replaceable unit and the image forming apparatus according to an exemplary embodiment of the present general inventive concept. Referring toFIGS. 1 and 5 , the CPU of theunit 200 determines whether a specific event is generated in operation S510. The specific event may include a case in which theimage forming apparatus 100 is powered on, or a case in which theunit 200 or components including theunit 200 are mounted in theimage forming apparatus 100. - If it is determined that a specific event occurs, the
unit 200 performs its own initialization in operation S520. The initialization includes calculating secret information required for data communication with the image forming apparatus after initialization, setup of a communication channel, initialization of memory values, checking remaining amounts of toner or ink, confirmation of the replacement time, or various other processes. - The
main controller 110 of theimage forming apparatus 100 transmits a command to attempt authentication between themain controller 110 and theCPU 220 in operation S530. If themain controller 110 does not receive a response from theCPU 220 in operation S540, themain controller 110 repeatedly transmits the command until the response is received. - When the response is received, the
main controller 110 authenticates communication with theCPU 220 in operation S550, as explained above. - If the authentication is successfully performed in operation S560, cryptographic data communication with the
main controller 110 is performed using a cryptographic algorithm in operation S570. -
FIG. 6 is a schematic view provided to explain a process of changing a cryptographic algorithm by theunit 200 according to an exemplary embodiment of the present general inventive concept. Referring toFIG. 6 , theunit 200 may support ARIA, Triple Data Encryption Standard (TDES), SEED, and Advanced Encryption Standard (AES) symmetric key algorithms, for example. Determining the process of which algorithm to use may take place when a key write system in a key management system (KMS) 600 generates key generating data. - If a cracking of the cryptographic algorithm is performed, the cryptographic algorithm may be changed by acquiring a new key from the KMS to which another of the four cryptographic algorithms is applied instead of manufacturing a
new unit 200. - As described above, the
image forming apparatus 100 may also support ARIA, TDES, SEED, and AES symmetric key algorithms in addition to an RSA asymmetric key algorithm. Accordingly, even if the cryptographic algorithm applied to theunit 200 is changed, theimage forming apparatus 100 changes a cryptographic algorithm in response, and performs the authentication and cryptographic data communication. - Therefore, the cryptographic algorithms may be changed conveniently by changing a key value in contrast to the conventional art, which requires a chip to be replaced.
-
FIG. 7 is a flowchart provided to explain a method of performing authentication and cryptographic data communication according to an exemplary embodiment of the present general inventive concept. Referring toFIGS. 1 and 7 , animage forming apparatus 100 transmits a command to request authentication along with a random value R1 in operation S710. - If the request to perform authentication is received, the
unit 200 generates a session key, using the received random value R1 and the random value R2 generated by theunit 200 in operation S715, and generates a message authentication code (MAC) using the generated session key in operation S720. - The first MAC generated by the
unit 200 is a pre-stored electronic signature information, and along with the random value R2, are transmitted to theimage forming apparatus 100 in operation S725. - The
image forming apparatus 100 verifies the received electronic signature of the first MAC generated by theunit 200 by comparing the received electronic signature information with pre-stored electronic signature information in operation S730. To verify the received electronic signature, theimage forming apparatus 100 may store electronic signature information of each unit, if a plurality of units are mounted in theimage forming apparatus 100. - If the received electronic signature is verified, the
image forming apparatus 100 generates a session key by combining the pre-generated random value R1 with the received random value R2 in operation S735, and a second MAC is generated by theimage forming apparatus 100 using the generated session key in operation S740. - The
image forming apparatus 100 then compares the generated second MAC of theimage forming apparatus 100 with the received first MAC of thereplaceable unit 200 in order to determine whether the two different MACs coincide in operation S745. The authentication is completed according to the verification of the received first MAC of thereplaceable unit 200. If the authentication is successfully performed, the cryptographic data communication may be performed. - To perform cryptographic data communication, it is assumed that the
image forming apparatus 100 uses the same key and cryptographic algorithm as those of theunit 200. The key may be the session key described above. - If the received first MAC of the
replaceable unit 200 is completely verified, theimage forming apparatus 100 generates a third MAC by applying the key and cryptographic algorithm to data when generating a communication message in operation S750. - The
image forming apparatus 100 transmits the communication message including the third MAC to theunit 200 in operation S755. - The
unit 200 extracts the data portion from the received communication message, and generates a fourth MAC by applying the above key and cryptographic algorithm to the data in operation S760. - The
unit 200 extracts a third MAC portion from the received communication message, and performs authentication by comparing the extracted third MAC portion with the fourth MAC calculated by theunit 200 in operation S765. - If the extracted third MAC portion is consistent with the fourth MAC calculated by the
unit 200, the communication message is treated as a valid communication message, and thus the operation corresponding to the message is performed in operation S770. On the other hand, if the third and fourth MACs are not consistent with each other, the communication message is treated as an invalid communication message, and is discarded. - A method of performing authentication and cryptographic data communication may also be applied to the exemplary embodiments explained with reference to the drawings. The
unit 200 may be implemented in diverse forms such as a semiconductor chip or semiconductor chip package, a normal unit, or a replaceable unit. - The present general inventive concept can also be embodied as computer-readable codes on a computer-readable medium. The computer-readable medium can include a computer-readable recording medium and a computer-readable transmission medium. The computer-readable recording medium is any data storage device that can store data as a program which can be thereafter read by a computer system. Examples of the computer-readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, and optical data storage devices. The computer-readable recording medium can also be distributed over network coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion. The computer-readable transmission medium can transmit carrier waves or signals (e.g., wired or wireless data transmission through the Internet). Also, functional programs, codes, and code segments to accomplish the present general inventive concept can be easily construed by programmers skilled in the art to which the present general inventive concept pertains.
- Although a few embodiments of the present general inventive concept have been shown and described, it will be appreciated by those skilled in the art that changes may be made in these embodiments without departing from the principles and spirit of the general inventive concept, the scope of which is defined in the appended claims and their equivalents.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/889,694 US8069477B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20080019844 | 2008-03-03 | ||
KR2008-19844 | 2008-03-03 | ||
KR1020080063071A KR101012398B1 (en) | 2008-03-03 | 2008-06-30 | Module for using O/S and image forming device for using it |
KR2008-63071 | 2008-06-30 | ||
US12/372,035 US8453260B2 (en) | 2008-03-03 | 2009-02-17 | Unit using OS and image forming apparatus using the same |
US12/889,694 US8069477B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/372,035 Continuation US8453260B2 (en) | 2008-03-03 | 2009-02-17 | Unit using OS and image forming apparatus using the same |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110004746A1 true US20110004746A1 (en) | 2011-01-06 |
US8069477B2 US8069477B2 (en) | 2011-11-29 |
Family
ID=41094676
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/348,976 Active 2031-10-14 US8332934B2 (en) | 2008-03-03 | 2009-01-06 | Unit using operating system and image forming apparatus using the same |
US12/367,589 Active 2031-07-08 US8386781B2 (en) | 2008-03-03 | 2009-02-09 | Unit using OS and image forming apparatus using the same |
US12/372,035 Active 2031-07-19 US8453260B2 (en) | 2008-03-03 | 2009-02-17 | Unit using OS and image forming apparatus using the same |
US12/388,610 Active 2031-06-06 US8330966B2 (en) | 2008-03-03 | 2009-02-19 | Unit using OS and image forming apparatus using the same |
US12/889,696 Active US8069478B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
US12/889,701 Active US8176549B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
US12/889,694 Active US8069477B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
US13/671,058 Active 2029-01-16 US9203980B2 (en) | 2008-03-03 | 2012-11-07 | Unit using operating system and image forming apparatus using the same |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/348,976 Active 2031-10-14 US8332934B2 (en) | 2008-03-03 | 2009-01-06 | Unit using operating system and image forming apparatus using the same |
US12/367,589 Active 2031-07-08 US8386781B2 (en) | 2008-03-03 | 2009-02-09 | Unit using OS and image forming apparatus using the same |
US12/372,035 Active 2031-07-19 US8453260B2 (en) | 2008-03-03 | 2009-02-17 | Unit using OS and image forming apparatus using the same |
US12/388,610 Active 2031-06-06 US8330966B2 (en) | 2008-03-03 | 2009-02-19 | Unit using OS and image forming apparatus using the same |
US12/889,696 Active US8069478B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
US12/889,701 Active US8176549B2 (en) | 2008-03-03 | 2010-09-24 | Unit using OS and image forming apparatus using the same |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/671,058 Active 2029-01-16 US9203980B2 (en) | 2008-03-03 | 2012-11-07 | Unit using operating system and image forming apparatus using the same |
Country Status (7)
Country | Link |
---|---|
US (8) | US8332934B2 (en) |
EP (4) | EP2250603A4 (en) |
KR (7) | KR101012398B1 (en) |
CN (12) | CN102200714B (en) |
BR (4) | BRPI0907869A2 (en) |
RU (6) | RU2452006C1 (en) |
WO (4) | WO2009110687A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100074440A1 (en) * | 2008-09-19 | 2010-03-25 | Electronics Telecommunications Research Institute | High-speed pipelined aria encryption apparatus |
CN104462931A (en) * | 2013-09-25 | 2015-03-25 | 三星电子株式会社 | Customer replaceable unit monitoring (CRUM) chip, image forming apparatus for authenticating the CRUM chip, and method thereof |
US9336471B2 (en) | 2011-12-20 | 2016-05-10 | Samsung Electronics Co., Ltd. | CRUM chip, image forming apparatus, and communication method of CRUM chip |
US9864300B2 (en) | 2013-10-18 | 2018-01-09 | S-Printing Solution Co., Ltd. | CRUM chip, image forming device for verifying consumable unit comprising the CRUM chip, and methods thereof |
US9881161B2 (en) | 2012-12-06 | 2018-01-30 | S-Printing Solution Co., Ltd. | System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof |
US9924071B2 (en) | 2011-09-09 | 2018-03-20 | S-Printing Solution Co., Ltd. | Crum chip and image forming device for authentication and communication, and methods thereof |
US9927768B2 (en) | 2011-09-09 | 2018-03-27 | S-Printing Solution Co., Ltd. | Crum chip and image forming device for communicating mutually, and method thereof |
Families Citing this family (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101012398B1 (en) * | 2008-03-03 | 2011-02-11 | 삼성전자주식회사 | Module for using O/S and image forming device for using it |
KR101158715B1 (en) * | 2009-07-24 | 2012-06-22 | 삼성전자주식회사 | Image forming apparatus and method for controlling lower power thereof |
US8762716B2 (en) * | 2009-10-15 | 2014-06-24 | Samsung Electronics Co., Ltd. | Image forming apparatus |
US8422908B2 (en) * | 2010-01-21 | 2013-04-16 | Samsung Electronics Co., Ltd. | Developing device and image forming apparatus including the same |
US8422893B2 (en) * | 2010-01-21 | 2013-04-16 | Samsung Electronics Co., Ltd | Developer and image forming apparatus including the same |
US8437680B2 (en) * | 2010-01-25 | 2013-05-07 | Samsung Electronics Co,. Ltd | Developer and image forming apparatus including the same |
CN102193473A (en) * | 2010-03-16 | 2011-09-21 | 株式会社理光 | Image formation device and method for preventing erroneous mounting of processing cartridge |
US20110261961A1 (en) * | 2010-04-22 | 2011-10-27 | Qualcomm Incorporated | Reduction in bearer setup time |
US8532506B2 (en) | 2010-11-29 | 2013-09-10 | Xerox Corporation | Multiple market consumable ID differentiation and validation system |
US8311419B2 (en) * | 2010-11-29 | 2012-11-13 | Xerox Corporation | Consumable ID differentiation and validation system with on-board processor |
US9385871B2 (en) | 2011-05-23 | 2016-07-05 | Samsung Electronics Co., Ltd | Method and apparatus for authenticating a non-volatile memory device |
JP5824977B2 (en) * | 2011-08-31 | 2015-12-02 | 株式会社リコー | Key pair management program, key pair management method, and image forming apparatus |
KR101477773B1 (en) * | 2012-12-24 | 2014-12-31 | 삼성전자주식회사 | CRUM chip and image forming device for authenticating and communicating mutually, and methods thereof |
CN103188080B (en) * | 2011-12-31 | 2018-02-09 | 中兴通讯股份有限公司 | A kind of machinery of consultation of key authentication end to end of identity-based mark and system |
RU2494471C1 (en) * | 2012-04-10 | 2013-09-27 | Закрытое акционерное общество "Современные беспроводные технологии" | Device for encrypting data according to standards gost 28147-89 and aes |
JP6012237B2 (en) * | 2012-04-18 | 2016-10-25 | キヤノン株式会社 | Information processing apparatus, control method, and program |
KR20140073384A (en) * | 2012-12-06 | 2014-06-16 | 삼성전자주식회사 | system on chip for performing secure boot, image forming apparatus comprising it, and methods thereof |
WO2014104511A1 (en) * | 2012-12-24 | 2014-07-03 | Samsung Electronics Co., Ltd. | Crum chip and image forming device for authentication and communication, and methods thereof |
KR101413722B1 (en) * | 2013-01-08 | 2014-07-01 | 주식회사 코아리버 | Smart toner security system |
US11127001B2 (en) * | 2013-05-09 | 2021-09-21 | Wayne Fueling Systems Llc | Systems and methods for secure communication |
FR3007169B1 (en) | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | METHOD OF VERIFYING THE AUTHENTICITY OF A PRODUCT |
FR3007168B1 (en) | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | MECHANISM FOR VERIFYING THE AUTHENTICITY OF A PRODUCT |
CN105431836B (en) * | 2013-07-31 | 2020-12-04 | 惠普发展公司,有限责任合伙企业 | Authenticating a consumable product based on a remaining life value |
CN105683843B (en) * | 2013-08-30 | 2019-05-31 | 惠普发展公司,有限责任合伙企业 | It is authenticated via the supply of timing challenge response |
KR20150051117A (en) | 2013-11-01 | 2015-05-11 | 삼성전자주식회사 | Crum unit mountable in consumable unit of image forming apparatus and image forming apparatus using the same |
US20150163954A1 (en) * | 2013-12-09 | 2015-06-11 | Silicon Graphics International Corp. | Server embedded storage device |
US9317009B2 (en) * | 2014-02-19 | 2016-04-19 | Xerox Corporation | Systems and methods for mounting an externally readable monitoring module on a rotating customer replaceable component in an operating device |
JP6398303B2 (en) * | 2014-05-12 | 2018-10-03 | ブラザー工業株式会社 | Printing apparatus system, connecting apparatus for printing apparatus system, control method for printing apparatus system, and program for printing apparatus system |
CN104102106B (en) * | 2014-07-16 | 2017-08-04 | 广州小微电子技术有限公司 | A kind of imaging cartridge verification method and its system |
US10019602B2 (en) * | 2014-08-28 | 2018-07-10 | Qualcomm Incorporated | System and method for improved security for a processor in a portable computing device (PCD) |
US9658644B2 (en) | 2014-10-06 | 2017-05-23 | S-Printing Solution Co., Ltd. | CRUM unit mountable in consumable unit of image forming apparatus and image forming apparatus using the same |
FR3032540B1 (en) * | 2015-02-06 | 2018-09-07 | Dover Europe Sarl | ADVANCED PROTECTION SYSTEM OF CONSUMABLE OR DETACHABLE ELEMENTS |
EP3269119B1 (en) | 2015-03-12 | 2020-05-06 | Visa International Service Association | Mutual authentication of software layers |
US9948615B1 (en) * | 2015-03-16 | 2018-04-17 | Pure Storage, Inc. | Increased storage unit encryption based on loss of trust |
ES2778825T3 (en) | 2015-07-31 | 2020-08-12 | Hewlett Packard Development Co Lp | Imaging Supplies |
JP6569415B2 (en) * | 2015-09-15 | 2019-09-04 | 株式会社リコー | Display input device, image forming apparatus, electronic apparatus, display control method, and program |
JP6575275B2 (en) * | 2015-09-30 | 2019-09-18 | ブラザー工業株式会社 | Server device and communication system including server device |
KR102376962B1 (en) * | 2015-12-15 | 2022-03-21 | 삼성전자주식회사 | Server, electronic device, and method for image processing in electronic device |
DE102016210423A1 (en) * | 2016-06-13 | 2017-12-14 | Robert Bosch Gmbh | Method and device for transmitting data |
WO2018020383A1 (en) * | 2016-07-25 | 2018-02-01 | Mobeewave, Inc. | System for and method of authenticating a component of an electronic device |
KR101866823B1 (en) * | 2017-09-15 | 2018-07-19 | 에이치피프린팅코리아 주식회사 | CRUM chip and image forming device for communicating mutually, and method thereof |
US20190095218A1 (en) * | 2017-09-26 | 2019-03-28 | Hewlett Packard Enterprise Develepment Lp | Creating or modifying artifacts on mounted operating system volumes |
US10542172B2 (en) * | 2018-04-13 | 2020-01-21 | Lexmark International, Inc. | Chip and supply item for imaging device, including communication |
US10419641B1 (en) | 2018-04-13 | 2019-09-17 | Lexmark International, Inc. | Chip and supply item for imaging device, including communication |
US10375273B1 (en) | 2018-04-13 | 2019-08-06 | Lexmark International, Inc. | Chip and supply item for imaging device, including communication |
BR112020020585A2 (en) * | 2018-04-13 | 2021-01-12 | Lexmark International, Inc. | CHIP AND SUPPLY ITEM FOR IMAGE DEVICE, INCLUDING COMMUNICATION |
KR20190121611A (en) * | 2018-04-18 | 2019-10-28 | 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. | Crum apparatus mountable in image forming apparatus, and image forming apparatus using the same |
KR20200004613A (en) * | 2018-07-04 | 2020-01-14 | 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. | Toner refill control of image forming apparatus |
CN110851183B (en) * | 2018-08-20 | 2024-04-12 | 联想企业解决方案(新加坡)有限公司 | Method for fast booting a processor in a multiprocessor architecture |
CN109315837A (en) * | 2018-09-21 | 2019-02-12 | 深圳市合元科技有限公司 | A kind of electronic cigarette control method and electronic cigarette |
CN110866290A (en) * | 2018-11-21 | 2020-03-06 | 哈尔滨安天科技集团股份有限公司 | Chip malicious tampering detection method and device, electronic equipment and storage medium |
MX2021006097A (en) * | 2018-12-03 | 2021-07-07 | Hewlett Packard Development Co | Logic circuitry. |
WO2020167283A1 (en) | 2019-02-11 | 2020-08-20 | Hewlett-Packard Development Company, L.P. | Recovery from corruption |
CN109948329A (en) * | 2019-03-13 | 2019-06-28 | 珠海奔图电子有限公司 | Security information reminding method and equipment |
KR102279245B1 (en) * | 2019-03-29 | 2021-07-20 | 한국항공대학교산학협력단 | Apparatus of encrypting for Internet-of-Things applications and method thereof |
KR20220053369A (en) * | 2020-10-22 | 2022-04-29 | 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. | Controlling an image forming job performed between senders and receivers based on groups |
US20240111905A1 (en) * | 2021-02-12 | 2024-04-04 | Hewlett-Packard Development Company, L.P. | Generating a request for reprocessing of a replaceable supply component |
US11818574B2 (en) * | 2021-05-27 | 2023-11-14 | Citrix Systems, Inc. | Provisioning devices securely using zero touch deployments |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5537517A (en) * | 1991-10-23 | 1996-07-16 | Seiko Epson Corporation | Information processing device in an electronic apparatus utilizing an accessory control device and methods of application |
US5765197A (en) * | 1993-12-16 | 1998-06-09 | International Business Machines Corporation | Method and system for authentication of a memory unit for a computer system |
US6332024B1 (en) * | 1998-03-05 | 2001-12-18 | Mitsubishi Denki Kabushiki Kaisha | Portable terminal |
US20020010875A1 (en) * | 2000-01-25 | 2002-01-24 | Johnson Jerome J. | Hot-upgrade/hot-add memory |
US20020030712A1 (en) * | 1997-07-12 | 2002-03-14 | Kia Silverbrook | Printing cartridge with an integrated circuit device |
US20030016504A1 (en) * | 2001-07-18 | 2003-01-23 | Raynham Michael B. | Server system with removable server cartridges |
US6532551B1 (en) * | 1999-05-14 | 2003-03-11 | Sharp Kabushiki Kaisha | Data management method for backup memory |
US20030123887A1 (en) * | 2002-01-03 | 2003-07-03 | Xerox Corporation | Adertising from the customer replaceable unit memory of a copier or printer cartridge |
US20040255149A1 (en) * | 2003-05-27 | 2004-12-16 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods |
US20050076088A1 (en) * | 2003-09-18 | 2005-04-07 | Kee Martin J. | Removable module for a portable electronic device having stand-alone and system functionality |
US20050162455A1 (en) * | 2001-08-06 | 2005-07-28 | Kia Silverbrook | Printing cartridge with an integrated circuit device |
US20050172118A1 (en) * | 2003-12-16 | 2005-08-04 | Masami Nasu | Electronic apparatus, image forming apparatus, method for controlling electronic apparatus, and system for managing image forming apparatus |
US7033011B2 (en) * | 2001-03-30 | 2006-04-25 | Brother Kogyo Kabushiki Kaisha | Ink cartridge, printing apparatus using the ink cartridge, and method for detecting remaining amount of ink using the ink cartridge |
US20060146355A1 (en) * | 2004-12-30 | 2006-07-06 | Samsung Electronics Co., Ltd. | System and method for controlling operation of a printer by using an external memory |
US20060168580A1 (en) * | 2003-02-21 | 2006-07-27 | Shunji Harada | Software-management system, recording medium, and information-processing device |
US7206092B2 (en) * | 1999-12-03 | 2007-04-17 | Canon Kabushiki Kaisha | Image-forming system, control method therefor, image-forming apparatus, data processing method, and storage medium |
US20070160204A1 (en) * | 2006-01-05 | 2007-07-12 | Nec Electronics Corporation | Microcontroller and authentication method between the controllers |
US7246098B1 (en) * | 1997-07-15 | 2007-07-17 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US20070211285A1 (en) * | 2002-12-02 | 2007-09-13 | Silverbrook Research Pty Ltd | Print Engine Having Authentication Device For Disabling Memory Writing Upon Power Drop |
US7286772B2 (en) * | 2004-01-26 | 2007-10-23 | Samsung Electronics Co., Ltd. | Toner monitoring network printer system and method of monitoring a toner cartridge thereof |
US7286774B1 (en) * | 2003-12-19 | 2007-10-23 | Cartridge Corporation Of America, Inc. | Universal printer chip |
US7343298B2 (en) * | 2000-10-20 | 2008-03-11 | Seiko Epson Corporation | Method and system for supply of expendables |
US20080252701A1 (en) * | 2006-08-08 | 2008-10-16 | Seiko Epson Corporation | Liquid container |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT1292544B1 (en) | 1997-04-10 | 1999-02-08 | Microtec Srl | DEVICE FOR MEASURING THE DIMENSIONS OF A VERY LONGITUDINALLY EXTENDED OBJECT WITH A CURVED CONTOUR CROSS SECTION. |
US6016409A (en) | 1997-04-11 | 2000-01-18 | Xerox Corporation | System for managing fuser modules in a digital printing apparatus |
US6803989B2 (en) * | 1997-07-15 | 2004-10-12 | Silverbrook Research Pty Ltd | Image printing apparatus including a microcontroller |
US7249108B1 (en) * | 1997-07-15 | 2007-07-24 | Silverbrook Research Pty Ltd | Validation protocol and system |
US6816968B1 (en) | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US6494562B1 (en) | 1998-09-03 | 2002-12-17 | Hewlett-Packard Company | Method and apparatus for identifying a sales channel |
TW522099B (en) | 1999-03-31 | 2003-03-01 | Seiko Epson Corp | Printing system, printing controller, printer, method for controlling printing operations, printing method, ink box, ink provider, and recording medium |
WO2001023987A1 (en) | 1999-09-30 | 2001-04-05 | M-Systems Flash Disk Pioneers Ltd. | Removable, active, personal storage device, system and method |
US6351621B1 (en) * | 2000-06-26 | 2002-02-26 | Xerox Corporation | Wireless interaction with memory associated with a replaceable module for office equipment |
JP2002014576A (en) | 2000-06-27 | 2002-01-18 | Canon Inc | Device and method for image forming and recording medium |
FR2816731B1 (en) * | 2000-11-14 | 2003-01-03 | Gemplus Card Int | METHOD FOR LOADING AND CUSTOMIZING THE INFORMATION AND PROGRAMS LOADED IN A CHIP CARD |
US7224800B1 (en) * | 2000-11-28 | 2007-05-29 | Nokia Corporation | System and method for authentication of a roaming subscriber |
US7240358B2 (en) * | 2000-12-08 | 2007-07-03 | Digital Fountain, Inc. | Methods and apparatus for scheduling, serving, receiving media-on demand for clients, servers arranged according to constraints on resources |
US6351618B1 (en) | 2000-12-20 | 2002-02-26 | Xerox Corporation | Method of using a security system for replaceable cartridges for printing machines |
DE10108487A1 (en) | 2001-02-22 | 2002-09-12 | Giesecke & Devrient Gmbh | Method and system for the distributed creation of a program for a programmable, portable data carrier |
US7418344B2 (en) * | 2001-08-02 | 2008-08-26 | Sandisk Corporation | Removable computer with mass storage |
US20030063311A1 (en) * | 2001-10-03 | 2003-04-03 | Covitt Marc L. | Method and apparatus identifying printing supplies |
US6917863B2 (en) * | 2001-12-21 | 2005-07-12 | Karl F. Milde, Jr. | System for assuming and maintaining secure remote control of an aircraft |
JP3891004B2 (en) * | 2002-02-26 | 2007-03-07 | 日本電気株式会社 | Information processing system, control method of the system, and program |
US20030231343A1 (en) * | 2002-05-08 | 2003-12-18 | Ayako Kobayashi | Image forming apparatus, program adding method, and a recording medium |
US20030215248A1 (en) * | 2002-05-17 | 2003-11-20 | Xerox Corporation | Machine post-launch process optimization through customer replaceable unit memory programming |
US6735399B2 (en) * | 2002-05-17 | 2004-05-11 | Xerox Corporation | Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming |
US20030215247A1 (en) * | 2002-05-17 | 2003-11-20 | Xerox Corporation | Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming provided in an alternate replaceable sub-assembly |
RU2268150C2 (en) | 2002-07-22 | 2006-01-20 | Корпорация "Самсунг Электроникс" | Device for monitoring of ink consumption in cartridge |
US6948067B2 (en) | 2002-07-24 | 2005-09-20 | Qualcomm, Inc. | Efficient encryption and authentication for data processing systems |
US20040212820A1 (en) * | 2003-03-17 | 2004-10-28 | Toshiba Tec Kabushiki Kaisha | Electronic apparatus with communication function and method of transmitting data by using the apparatus |
US7240995B2 (en) * | 2003-05-06 | 2007-07-10 | Lexmark International, Inc. | Method of authenticating a consumable |
US6895191B2 (en) * | 2003-05-13 | 2005-05-17 | Xerox Corporation | Insertion verification of replaceable module of printing apparatus |
JP2007524908A (en) | 2003-06-19 | 2007-08-30 | クゥアルコム・インコーポレイテッド | Apparatus and method for multi-function authentication device |
US7197633B2 (en) * | 2003-07-30 | 2007-03-27 | Xerox Corporation | Wireless machine post-launch configuration and option upgrade |
US7308584B2 (en) * | 2003-08-14 | 2007-12-11 | International Business Machines Corporation | System and method for securing a portable processing module |
US7434053B2 (en) * | 2003-08-28 | 2008-10-07 | Hewlett-Packard Development Company, L.P. | Methods and systems for providing an identification key to a printing device |
JP3673793B2 (en) | 2003-08-29 | 2005-07-20 | キヤノン株式会社 | Process cartridge, process cartridge mounting mechanism, and electrophotographic image forming apparatus |
JP4265383B2 (en) | 2003-11-14 | 2009-05-20 | 富士ゼロックス株式会社 | Image forming apparatus and data read / write method |
JP2004086232A (en) | 2003-12-16 | 2004-03-18 | Fuji Photo Film Co Ltd | Device for inhibiting reuse of cartridge and image forming system |
US7712891B2 (en) * | 2003-12-26 | 2010-05-11 | Brother Kogyo Kabushiki Kaisha | Image-forming device |
US7107502B2 (en) | 2004-01-29 | 2006-09-12 | International Business Machines Corporation | Diagnostic method for detection of multiple defects in a Level Sensitive Scan Design (LSSD) |
JP4766365B2 (en) * | 2004-05-17 | 2011-09-07 | 富士ゼロックス株式会社 | Image forming apparatus equipped with an exchange unit |
JP5002120B2 (en) * | 2004-05-17 | 2012-08-15 | 富士ゼロックス株式会社 | Image forming apparatus and image forming system equipped with exchange unit |
JP5016189B2 (en) | 2004-08-03 | 2012-09-05 | 株式会社リコー | Electronic device, electronic device control method, program, and recording medium |
US7146114B2 (en) * | 2004-10-18 | 2006-12-05 | Xerox Corporation | Systems and methods for end-of-life prediction |
KR100655932B1 (en) * | 2004-11-29 | 2006-12-11 | 삼성전자주식회사 | image forming device, host device and method thereof |
KR100577715B1 (en) * | 2004-12-01 | 2006-05-10 | 삼성전자주식회사 | Image forming device and controlling method thereof |
KR100793955B1 (en) * | 2004-12-03 | 2008-01-16 | 삼성전자주식회사 | Image forming device, host device, image forming system and controlling method thereof |
US7401222B2 (en) * | 2004-12-16 | 2008-07-15 | Xerox Corporation | Method of authentication of memory device and device therefor |
US7286773B2 (en) * | 2004-12-17 | 2007-10-23 | Xerox Corporation | Device identification method and system |
US7231153B2 (en) | 2005-01-13 | 2007-06-12 | Xerox Corporation | Systems and methods for monitoring replaceable units |
US7146112B2 (en) * | 2005-01-13 | 2006-12-05 | Xerox Corporation | Replaceable unit monitor reader with auto polling capabilities |
JP4970780B2 (en) | 2005-03-09 | 2012-07-11 | 株式会社リコー | Electronic device and exchange unit |
US7840998B2 (en) * | 2005-05-20 | 2010-11-23 | Xerox Corporation | System and method for authentication of replaceable modules |
JP4319176B2 (en) * | 2005-08-23 | 2009-08-26 | シャープ株式会社 | Network system including customer replaceable units |
US7529491B2 (en) | 2005-09-15 | 2009-05-05 | Xerox Corporation | Apparatus and method for adapting a machine to communicate with customer replaceable unit monitors having different interface formats |
US7551859B2 (en) * | 2005-09-27 | 2009-06-23 | Steven Miller | Multiple region printer chip |
US20070079125A1 (en) * | 2005-09-27 | 2007-04-05 | Lexmark International, Inc. | Interface protocol method and system |
US7667724B2 (en) | 2005-10-13 | 2010-02-23 | Xerox Corporation | Customer replaceable unit with high voltage power supply |
US7997711B2 (en) * | 2005-12-23 | 2011-08-16 | Xerox Corporation | Supply units having an associated electronically-readable memory device |
EP1977552B1 (en) * | 2006-01-24 | 2012-08-01 | Stepnexus, Inc. | Method and system for personalizing smart cards using asymmetric key cryptography |
JP2007219802A (en) * | 2006-02-16 | 2007-08-30 | Hitachi Global Storage Technologies Netherlands Bv | Storage, its controller, and its control method |
JP2007328438A (en) | 2006-06-06 | 2007-12-20 | Seiko Epson Corp | Information processor, its data backup, and restoration method |
US20080034440A1 (en) * | 2006-07-07 | 2008-02-07 | Michael Holtzman | Content Control System Using Versatile Control Structure |
US7987375B2 (en) * | 2006-11-20 | 2011-07-26 | Canon Kabushiki Kaisha | Communication apparatus, control method thereof and computer readable medium |
US7526215B2 (en) * | 2007-01-25 | 2009-04-28 | Xerox Corporation | Reserve life run-on feature for customer replaceable units |
JP4857201B2 (en) * | 2007-06-20 | 2012-01-18 | キヤノン株式会社 | Information processing device |
JP5095325B2 (en) * | 2007-09-14 | 2012-12-12 | 株式会社リコー | Image processing apparatus and image processing method |
JP4963461B2 (en) * | 2007-11-02 | 2012-06-27 | 株式会社リコー | Image forming apparatus, program, and printing suppression method |
KR101198771B1 (en) * | 2008-01-09 | 2012-11-12 | 삼성전자주식회사 | Image forming apparatus and method the same |
KR101012398B1 (en) * | 2008-03-03 | 2011-02-11 | 삼성전자주식회사 | Module for using O/S and image forming device for using it |
-
2008
- 2008-06-30 KR KR1020080063071A patent/KR101012398B1/en active IP Right Grant
- 2008-06-30 KR KR1020080063065A patent/KR100997239B1/en active IP Right Grant
- 2008-06-30 KR KR1020080063068A patent/KR100997879B1/en active IP Right Grant
- 2008-06-30 KR KR1020080063063A patent/KR100997238B1/en active IP Right Grant
-
2009
- 2009-01-06 US US12/348,976 patent/US8332934B2/en active Active
- 2009-02-09 US US12/367,589 patent/US8386781B2/en active Active
- 2009-02-17 US US12/372,035 patent/US8453260B2/en active Active
- 2009-02-19 RU RU2010136826/08A patent/RU2452006C1/en active
- 2009-02-19 WO PCT/KR2009/000784 patent/WO2009110687A1/en active Application Filing
- 2009-02-19 BR BRPI0907869-0A patent/BRPI0907869A2/en not_active Application Discontinuation
- 2009-02-19 EP EP09718117A patent/EP2250603A4/en not_active Ceased
- 2009-02-19 US US12/388,610 patent/US8330966B2/en active Active
- 2009-02-25 WO PCT/KR2009/000894 patent/WO2009110692A1/en active Application Filing
- 2009-02-25 EP EP09717157A patent/EP2250602A4/en not_active Ceased
- 2009-02-25 BR BRPI0909781-3A patent/BRPI0909781B1/en active IP Right Grant
- 2009-02-25 EP EP09716482A patent/EP2250600A4/en not_active Ceased
- 2009-02-25 RU RU2010136824/08A patent/RU2452009C1/en active
- 2009-02-25 WO PCT/KR2009/000895 patent/WO2009110693A1/en active Application Filing
- 2009-02-25 BR BRPI0909684A patent/BRPI0909684A2/en active IP Right Grant
- 2009-02-25 RU RU2010136825/08A patent/RU2463655C2/en active
- 2009-02-25 EP EP09718391.7A patent/EP2250605B1/en not_active Revoked
- 2009-02-25 WO PCT/KR2009/000892 patent/WO2009110691A1/en active Application Filing
- 2009-02-25 RU RU2010136823/08A patent/RU2471229C2/en active
- 2009-02-25 BR BRPI0909683-3A patent/BRPI0909683B1/en active IP Right Grant
- 2009-02-27 CN CN201110127716.4A patent/CN102200714B/en active Active
- 2009-02-27 CN CN2009101180621A patent/CN101527767B/en active Active
- 2009-02-27 CN CN201010557657.XA patent/CN102073237B/en active Active
- 2009-03-02 CN CN201010542831.3A patent/CN102063031B/en active Active
- 2009-03-02 CN CN2009100077888A patent/CN101526771B/en active Active
- 2009-03-02 CN CN201010557633.4A patent/CN102073236B/en active Active
- 2009-03-02 CN CN201310217758.6A patent/CN103345134B/en active Active
- 2009-03-02 CN CN201010550444.4A patent/CN102063034B/en active Active
- 2009-03-02 CN CN200910007791XA patent/CN101526772B/en active Active
- 2009-03-02 CN CN2009100077892A patent/CN101526796B/en active Active
- 2009-03-02 CN CN201110136289.6A patent/CN102213924B/en active Active
- 2009-03-02 CN CN201210122996.4A patent/CN102682238B/en active Active
-
2010
- 2010-09-24 US US12/889,696 patent/US8069478B2/en active Active
- 2010-09-24 US US12/889,701 patent/US8176549B2/en active Active
- 2010-09-24 US US12/889,694 patent/US8069477B2/en active Active
- 2010-12-21 KR KR1020100131972A patent/KR20110014537A/en not_active Application Discontinuation
- 2010-12-21 KR KR1020100131965A patent/KR101018387B1/en active IP Right Grant
- 2010-12-21 KR KR1020100131971A patent/KR101123695B1/en not_active IP Right Cessation
-
2012
- 2012-08-01 RU RU2012132973/08A patent/RU2598331C2/en active
- 2012-08-01 RU RU2012132972A patent/RU2611014C2/en active
- 2012-11-07 US US13/671,058 patent/US9203980B2/en active Active
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5537517A (en) * | 1991-10-23 | 1996-07-16 | Seiko Epson Corporation | Information processing device in an electronic apparatus utilizing an accessory control device and methods of application |
US5765197A (en) * | 1993-12-16 | 1998-06-09 | International Business Machines Corporation | Method and system for authentication of a memory unit for a computer system |
US20020030712A1 (en) * | 1997-07-12 | 2002-03-14 | Kia Silverbrook | Printing cartridge with an integrated circuit device |
US20080087736A1 (en) * | 1997-07-12 | 2008-04-17 | Silverbrook Research Pty Ltd | Printed Infra-Red Data Structure With Targets |
US20040004651A1 (en) * | 1997-07-12 | 2004-01-08 | Kia Silverbrook | Printing cartridge with a data-carrying integrated circuit device |
US20050146583A1 (en) * | 1997-07-12 | 2005-07-07 | Kia Silverbrook | Printing cartridge having IC device for interfacing with printing system |
US7246098B1 (en) * | 1997-07-15 | 2007-07-17 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US6332024B1 (en) * | 1998-03-05 | 2001-12-18 | Mitsubishi Denki Kabushiki Kaisha | Portable terminal |
US6532551B1 (en) * | 1999-05-14 | 2003-03-11 | Sharp Kabushiki Kaisha | Data management method for backup memory |
US7206092B2 (en) * | 1999-12-03 | 2007-04-17 | Canon Kabushiki Kaisha | Image-forming system, control method therefor, image-forming apparatus, data processing method, and storage medium |
US20020010875A1 (en) * | 2000-01-25 | 2002-01-24 | Johnson Jerome J. | Hot-upgrade/hot-add memory |
US7343298B2 (en) * | 2000-10-20 | 2008-03-11 | Seiko Epson Corporation | Method and system for supply of expendables |
US7033011B2 (en) * | 2001-03-30 | 2006-04-25 | Brother Kogyo Kabushiki Kaisha | Ink cartridge, printing apparatus using the ink cartridge, and method for detecting remaining amount of ink using the ink cartridge |
US20030016504A1 (en) * | 2001-07-18 | 2003-01-23 | Raynham Michael B. | Server system with removable server cartridges |
US20050162455A1 (en) * | 2001-08-06 | 2005-07-28 | Kia Silverbrook | Printing cartridge with an integrated circuit device |
US20030123887A1 (en) * | 2002-01-03 | 2003-07-03 | Xerox Corporation | Adertising from the customer replaceable unit memory of a copier or printer cartridge |
US20070211285A1 (en) * | 2002-12-02 | 2007-09-13 | Silverbrook Research Pty Ltd | Print Engine Having Authentication Device For Disabling Memory Writing Upon Power Drop |
US20060168580A1 (en) * | 2003-02-21 | 2006-07-27 | Shunji Harada | Software-management system, recording medium, and information-processing device |
US20040255149A1 (en) * | 2003-05-27 | 2004-12-16 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods |
US7383444B2 (en) * | 2003-05-27 | 2008-06-03 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods |
US20050076088A1 (en) * | 2003-09-18 | 2005-04-07 | Kee Martin J. | Removable module for a portable electronic device having stand-alone and system functionality |
US20050172118A1 (en) * | 2003-12-16 | 2005-08-04 | Masami Nasu | Electronic apparatus, image forming apparatus, method for controlling electronic apparatus, and system for managing image forming apparatus |
US7286774B1 (en) * | 2003-12-19 | 2007-10-23 | Cartridge Corporation Of America, Inc. | Universal printer chip |
US7286772B2 (en) * | 2004-01-26 | 2007-10-23 | Samsung Electronics Co., Ltd. | Toner monitoring network printer system and method of monitoring a toner cartridge thereof |
US20060146355A1 (en) * | 2004-12-30 | 2006-07-06 | Samsung Electronics Co., Ltd. | System and method for controlling operation of a printer by using an external memory |
US20070160204A1 (en) * | 2006-01-05 | 2007-07-12 | Nec Electronics Corporation | Microcontroller and authentication method between the controllers |
US20080252701A1 (en) * | 2006-08-08 | 2008-10-16 | Seiko Epson Corporation | Liquid container |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100074440A1 (en) * | 2008-09-19 | 2010-03-25 | Electronics Telecommunications Research Institute | High-speed pipelined aria encryption apparatus |
US8509428B2 (en) * | 2008-09-19 | 2013-08-13 | Electronics And Telecommunications Research Institute | High-speed pipelined ARIA encryption apparatus |
US9924071B2 (en) | 2011-09-09 | 2018-03-20 | S-Printing Solution Co., Ltd. | Crum chip and image forming device for authentication and communication, and methods thereof |
US9927768B2 (en) | 2011-09-09 | 2018-03-27 | S-Printing Solution Co., Ltd. | Crum chip and image forming device for communicating mutually, and method thereof |
US9973658B2 (en) | 2011-09-09 | 2018-05-15 | S-Printing Solution Co., Ltd. | CRUM chip and image forming device for authentication and communication, and methods thereof |
US9977398B2 (en) | 2011-09-09 | 2018-05-22 | S-Printing Solution Co., Ltd. | CRUM chip and image forming device for communicating mutually, and method thereof |
US9336471B2 (en) | 2011-12-20 | 2016-05-10 | Samsung Electronics Co., Ltd. | CRUM chip, image forming apparatus, and communication method of CRUM chip |
US9881161B2 (en) | 2012-12-06 | 2018-01-30 | S-Printing Solution Co., Ltd. | System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof |
US10878098B2 (en) | 2012-12-06 | 2020-12-29 | Hewlett-Packard Development Company, L.P. | System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof |
CN104462931A (en) * | 2013-09-25 | 2015-03-25 | 三星电子株式会社 | Customer replaceable unit monitoring (CRUM) chip, image forming apparatus for authenticating the CRUM chip, and method thereof |
US9864300B2 (en) | 2013-10-18 | 2018-01-09 | S-Printing Solution Co., Ltd. | CRUM chip, image forming device for verifying consumable unit comprising the CRUM chip, and methods thereof |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8069477B2 (en) | Unit using OS and image forming apparatus using the same | |
US9973658B2 (en) | CRUM chip and image forming device for authentication and communication, and methods thereof | |
KR101780734B1 (en) | CRUM chip and image forming device for communicating mutually, and method thereof | |
KR101866823B1 (en) | CRUM chip and image forming device for communicating mutually, and method thereof | |
BRPI0909684B1 (en) | IMAGE TRAINING APPARATUS, CRUM UNIT, REPLACABLE UNIT AND METHOD FOR REPORTING ENCRYPTED DATA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: S-PRINTING SOLUTION CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAMSUNG ELECTRONICS CO., LTD;REEL/FRAME:041852/0125 Effective date: 20161104 |
|
AS | Assignment |
Owner name: HP PRINTING KOREA CO., LTD., KOREA, REPUBLIC OF Free format text: CHANGE OF NAME;ASSIGNOR:S-PRINTING SOLUTION CO., LTD.;REEL/FRAME:047370/0405 Effective date: 20180316 |
|
AS | Assignment |
Owner name: HP PRINTING KOREA CO., LTD., KOREA, REPUBLIC OF Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE DOCUMENTATION EVIDENCING THE CHANGE OF NAME PREVIOUSLY RECORDED ON REEL 047370 FRAME 0405. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:S-PRINTING SOLUTION CO., LTD.;REEL/FRAME:047769/0001 Effective date: 20180316 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: HP PRINTING KOREA CO., LTD., KOREA, REPUBLIC OF Free format text: CHANGE OF LEGAL ENTITY EFFECTIVE AUG. 31, 2018;ASSIGNOR:HP PRINTING KOREA CO., LTD.;REEL/FRAME:050938/0139 Effective date: 20190611 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: CONFIRMATORY ASSIGNMENT EFFECTIVE NOVEMBER 1, 2018;ASSIGNOR:HP PRINTING KOREA CO., LTD.;REEL/FRAME:050747/0080 Effective date: 20190826 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |